afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:05.188719 700060 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.188736 700060 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc001c48180 6 D0713 05:28:05.188744 700060 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:05.188971 700060 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.189038 700060 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc001c48180 7 D0713 05:28:05.189057 700060 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:05.189181 700060 usertrap_amd64.go:212] [ 608: 609] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.189217 700060 usertrap_amd64.go:122] [ 608: 609] Allocate a new trap: 0xc001c48180 8 D0713 05:28:05.189228 700060 usertrap_amd64.go:225] [ 608: 609] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:05.189550 700060 usertrap_amd64.go:212] [ 608: 609] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.189580 700060 usertrap_amd64.go:122] [ 608: 609] Allocate a new trap: 0xc001c48180 9 D0713 05:28:05.189602 700060 usertrap_amd64.go:225] [ 608: 609] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:05.189784 700060 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.189809 700060 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc001c48180 10 D0713 05:28:05.189821 700060 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:05.197264 700060 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.197290 700060 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc001c48180 11 D0713 05:28:05.197299 700060 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:05.200031 700060 usertrap_amd64.go:212] [ 608: 609] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.200057 700060 usertrap_amd64.go:122] [ 608: 609] Allocate a new trap: 0xc001c48180 12 D0713 05:28:05.200069 700060 usertrap_amd64.go:225] [ 608: 609] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:05.200122 700060 usertrap_amd64.go:212] [ 608: 609] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.200137 700060 usertrap_amd64.go:122] [ 608: 609] Allocate a new trap: 0xc001c48180 13 D0713 05:28:05.200146 700060 usertrap_amd64.go:225] [ 608: 609] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:05.200201 700060 task_signals.go:470] [ 608: 608] Notified of signal 23 D0713 05:28:05.200308 700060 task_signals.go:220] [ 608: 608] Signal 23: delivering to handler D0713 05:28:05.207856 700060 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.207901 700060 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc001c48180 14 D0713 05:28:05.207916 700060 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:05.207980 700060 task_exit.go:204] [ 608: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.208005 700060 task_exit.go:204] [ 608: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.208034 700060 task_signals.go:204] [ 608: 611] Signal 608, PID: 611, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.208065 700060 task_exit.go:204] [ 608: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.208062 700060 task_signals.go:204] [ 608: 609] Signal 608, PID: 609, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.208076 700060 task_exit.go:204] [ 608: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.208034 700060 task_signals.go:204] [ 608: 610] Signal 608, PID: 610, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.208082 700060 task_exit.go:204] [ 608: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.208118 700060 task_signals.go:204] [ 608: 612] Signal 608, PID: 612, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.208148 700060 task_exit.go:204] [ 608: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.208168 700060 task_exit.go:204] [ 608: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.208176 700060 task_exit.go:204] [ 608: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.208191 700060 task_exit.go:204] [ 608: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.208210 700060 task_exit.go:204] [ 608: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.208225 700060 task_exit.go:204] [ 608: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.208240 700060 task_exit.go:204] [ 608: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.209332 700060 task_exit.go:204] [ 608: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.209360 700060 task_exit.go:204] [ 608: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.209400 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.209435 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.209444 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.209505 700060 task_exit.go:204] [ 608: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.211384 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.212637 700060 syscalls.go:262] [ 613: 613] Allocating stack with size of 8388608 bytes D0713 05:28:05.212741 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.216234 700060 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.216272 700060 usertrap_amd64.go:106] [ 613: 613] Map a usertrap vma at 67000 D0713 05:28:05.216368 700060 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001bd6a50 1 D0713 05:28:05.216401 700060 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:05.216733 700060 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.216760 700060 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001bd6a50 2 D0713 05:28:05.216772 700060 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:05.217358 700060 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.217382 700060 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001bd6a50 3 D0713 05:28:05.217398 700060 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:05.227558 700060 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.227586 700060 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001bd6a50 4 D0713 05:28:05.227597 700060 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:05.229068 700060 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.229124 700060 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001bd6a50 5 D0713 05:28:05.229140 700060 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:05.229190 700060 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.229199 700060 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001bd6a50 6 D0713 05:28:05.229209 700060 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:05.229635 700060 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.229659 700060 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001bd6a50 7 D0713 05:28:05.229668 700060 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:05.229916 700060 usertrap_amd64.go:212] [ 613: 614] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.229938 700060 usertrap_amd64.go:122] [ 613: 614] Allocate a new trap: 0xc001bd6a50 8 D0713 05:28:05.229947 700060 usertrap_amd64.go:225] [ 613: 614] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:05.230295 700060 usertrap_amd64.go:212] [ 613: 614] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.230325 700060 usertrap_amd64.go:122] [ 613: 614] Allocate a new trap: 0xc001bd6a50 9 D0713 05:28:05.230337 700060 usertrap_amd64.go:225] [ 613: 614] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:05.230351 700060 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.230358 700060 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001bd6a50 10 D0713 05:28:05.230366 700060 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:05.230919 700060 usertrap_amd64.go:212] [ 613: 614] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.230950 700060 usertrap_amd64.go:122] [ 613: 614] Allocate a new trap: 0xc001bd6a50 11 D0713 05:28:05.230961 700060 usertrap_amd64.go:225] [ 613: 614] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:05.230997 700060 usertrap_amd64.go:212] [ 613: 614] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.231004 700060 usertrap_amd64.go:122] [ 613: 614] Allocate a new trap: 0xc001bd6a50 12 D0713 05:28:05.231030 700060 usertrap_amd64.go:225] [ 613: 614] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:05.231046 700060 task_signals.go:470] [ 613: 613] Notified of signal 23 D0713 05:28:05.231166 700060 task_signals.go:220] [ 613: 613] Signal 23: delivering to handler D0713 05:28:05.238470 700060 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.238494 700060 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001bd6a50 13 D0713 05:28:05.238502 700060 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:05.242354 700060 task_signals.go:470] [ 613: 613] Notified of signal 23 D0713 05:28:05.242421 700060 task_signals.go:220] [ 613: 613] Signal 23: delivering to handler I0713 05:28:05.252682 700060 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0713 05:28:05.252777 700060 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.252791 700060 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001bd6a50 14 D0713 05:28:05.252804 700060 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:05.252863 700060 task_exit.go:204] [ 613: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.252886 700060 task_exit.go:204] [ 613: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.252905 700060 task_signals.go:204] [ 613: 615] Signal 613, PID: 615, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.252908 700060 task_signals.go:204] [ 613: 617] Signal 613, PID: 617, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.252922 700060 task_signals.go:204] [ 613: 614] Signal 613, PID: 614, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.252934 700060 task_exit.go:204] [ 613: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.252987 700060 task_signals.go:204] [ 613: 616] Signal 613, PID: 616, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.252988 700060 task_exit.go:204] [ 613: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.253016 700060 task_exit.go:204] [ 613: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.253053 700060 task_exit.go:204] [ 613: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.253081 700060 task_exit.go:204] [ 613: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.253097 700060 task_exit.go:204] [ 613: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.253108 700060 task_exit.go:204] [ 613: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.253125 700060 task_exit.go:204] [ 613: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.253132 700060 task_exit.go:204] [ 613: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.253150 700060 task_exit.go:204] [ 613: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.254226 700060 task_exit.go:204] [ 613: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.254256 700060 task_exit.go:204] [ 613: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.254272 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.254344 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.254371 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.254567 700060 task_exit.go:204] [ 613: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.255030 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.256672 700060 syscalls.go:262] [ 618: 618] Allocating stack with size of 8388608 bytes D0713 05:28:05.256785 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.258460 700060 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.258501 700060 usertrap_amd64.go:106] [ 618: 618] Map a usertrap vma at 60000 D0713 05:28:05.258574 700060 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc0009ae330 1 D0713 05:28:05.258612 700060 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:05.258974 700060 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.258992 700060 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc0009ae330 2 D0713 05:28:05.258998 700060 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:05.260022 700060 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.260048 700060 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc0009ae330 3 D0713 05:28:05.260058 700060 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:05.265876 700060 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.265903 700060 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc0009ae330 4 D0713 05:28:05.265912 700060 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:05.268856 700060 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.268889 700060 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc0009ae330 5 D0713 05:28:05.268916 700060 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:05.269086 700060 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.269113 700060 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc0009ae330 6 D0713 05:28:05.269125 700060 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:05.269673 700060 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.269691 700060 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc0009ae330 7 D0713 05:28:05.269700 700060 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:05.269872 700060 usertrap_amd64.go:212] [ 618: 619] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.269886 700060 usertrap_amd64.go:122] [ 618: 619] Allocate a new trap: 0xc0009ae330 8 D0713 05:28:05.269897 700060 usertrap_amd64.go:225] [ 618: 619] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:05.269964 700060 usertrap_amd64.go:212] [ 618: 619] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.269982 700060 usertrap_amd64.go:122] [ 618: 619] Allocate a new trap: 0xc0009ae330 9 D0713 05:28:05.269991 700060 usertrap_amd64.go:225] [ 618: 619] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:05.270086 700060 usertrap_amd64.go:212] [ 618: 619] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.270109 700060 usertrap_amd64.go:122] [ 618: 619] Allocate a new trap: 0xc0009ae330 10 D0713 05:28:05.270120 700060 usertrap_amd64.go:225] [ 618: 619] Apply the binary patch addr 46b020 trap addr 60320 ([184 39 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:05.270368 700060 usertrap_amd64.go:212] [ 618: 619] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.270388 700060 usertrap_amd64.go:122] [ 618: 619] Allocate a new trap: 0xc0009ae330 11 D0713 05:28:05.270398 700060 usertrap_amd64.go:225] [ 618: 619] Apply the binary patch addr 46b04f trap addr 60370 ([184 234 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:05.270448 700060 task_signals.go:481] [ 618: 618] No task notified of signal 23 D0713 05:28:05.270533 700060 task_signals.go:220] [ 618: 618] Signal 23: delivering to handler D0713 05:28:05.270606 700060 usertrap_amd64.go:212] [ 618: 620] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.270656 700060 usertrap_amd64.go:122] [ 618: 620] Allocate a new trap: 0xc0009ae330 12 D0713 05:28:05.270711 700060 usertrap_amd64.go:225] [ 618: 620] Apply the binary patch addr 46b57c trap addr 603c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:05.277865 700060 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.277904 700060 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc0009ae330 13 D0713 05:28:05.277918 700060 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:05.281023 700060 task_signals.go:470] [ 618: 618] Notified of signal 23 D0713 05:28:05.281077 700060 task_signals.go:220] [ 618: 618] Signal 23: delivering to handler I0713 05:28:05.287804 700060 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0713 05:28:05.287881 700060 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.287892 700060 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc0009ae330 14 D0713 05:28:05.287904 700060 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:05.287981 700060 task_exit.go:204] [ 618: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.288009 700060 task_exit.go:204] [ 618: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.288041 700060 task_signals.go:204] [ 618: 622] Signal 618, PID: 622, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.288063 700060 task_exit.go:204] [ 618: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.288075 700060 task_signals.go:204] [ 618: 619] Signal 618, PID: 619, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.288067 700060 task_signals.go:204] [ 618: 620] Signal 618, PID: 620, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.288087 700060 task_exit.go:204] [ 618: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.288109 700060 task_exit.go:204] [ 618: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.288151 700060 task_exit.go:204] [ 618: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.288149 700060 task_signals.go:204] [ 618: 621] Signal 618, PID: 621, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.288169 700060 task_exit.go:204] [ 618: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.288185 700060 task_exit.go:204] [ 618: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.288195 700060 task_exit.go:204] [ 618: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.288209 700060 task_exit.go:204] [ 618: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.288223 700060 task_exit.go:204] [ 618: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.288230 700060 task_exit.go:204] [ 618: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.289270 700060 task_exit.go:204] [ 618: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.289305 700060 task_exit.go:204] [ 618: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.289319 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.289345 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.289411 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.289755 700060 task_exit.go:204] [ 618: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.290573 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.292111 700060 syscalls.go:262] [ 623: 623] Allocating stack with size of 8388608 bytes D0713 05:28:05.292217 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.293358 700060 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.293398 700060 usertrap_amd64.go:106] [ 623: 623] Map a usertrap vma at 68000 D0713 05:28:05.293479 700060 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc0004a2e70 1 D0713 05:28:05.293505 700060 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:05.294515 700060 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.294547 700060 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc0004a2e70 2 D0713 05:28:05.294561 700060 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:05.295297 700060 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.295313 700060 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc0004a2e70 3 D0713 05:28:05.295326 700060 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:05.301667 700060 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.301701 700060 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc0004a2e70 4 D0713 05:28:05.301715 700060 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:05.302971 700060 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.303009 700060 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc0004a2e70 5 D0713 05:28:05.303024 700060 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:05.303079 700060 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.303086 700060 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc0004a2e70 6 D0713 05:28:05.303093 700060 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:05.303319 700060 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.303416 700060 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc0004a2e70 7 D0713 05:28:05.303440 700060 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:05.303616 700060 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.303641 700060 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc0004a2e70 8 D0713 05:28:05.303669 700060 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:05.303873 700060 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.303904 700060 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc0004a2e70 9 D0713 05:28:05.303917 700060 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:05.304022 700060 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.304044 700060 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc0004a2e70 10 D0713 05:28:05.304054 700060 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:05.311086 700060 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.311134 700060 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc0004a2e70 11 D0713 05:28:05.311151 700060 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:05.315356 700060 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.315405 700060 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc0004a2e70 12 D0713 05:28:05.315419 700060 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:05.315472 700060 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.315514 700060 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc0004a2e70 13 D0713 05:28:05.315530 700060 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:05.315648 700060 task_signals.go:470] [ 623: 623] Notified of signal 23 D0713 05:28:05.315739 700060 task_signals.go:220] [ 623: 623] Signal 23: delivering to handler I0713 05:28:05.322752 700060 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0713 05:28:05.322865 700060 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.322896 700060 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc0004a2e70 14 D0713 05:28:05.322911 700060 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:05.323005 700060 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.323040 700060 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.323055 700060 task_signals.go:204] [ 623: 625] Signal 623, PID: 625, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.323085 700060 task_signals.go:204] [ 623: 627] Signal 623, PID: 627, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.323086 700060 task_signals.go:204] [ 623: 624] Signal 623, PID: 624, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.323092 700060 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.323121 700060 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.323142 700060 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.323067 700060 task_signals.go:204] [ 623: 626] Signal 623, PID: 626, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.323161 700060 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.323168 700060 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.323174 700060 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.323220 700060 task_exit.go:204] [ 623: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.323253 700060 task_exit.go:204] [ 623: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.323317 700060 task_exit.go:204] [ 623: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.323332 700060 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.324402 700060 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.324494 700060 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.324520 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.324615 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.324636 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.324828 700060 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.325075 700060 task_signals.go:470] [ 5: 19] Notified of signal 23 D0713 05:28:05.325264 700060 task_signals.go:220] [ 5: 19] Signal 23: delivering to handler D0713 05:28:05.325761 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.327334 700060 syscalls.go:262] [ 628: 628] Allocating stack with size of 8388608 bytes D0713 05:28:05.327438 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.330130 700060 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.330177 700060 usertrap_amd64.go:106] [ 628: 628] Map a usertrap vma at 69000 D0713 05:28:05.330296 700060 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001bd71d0 1 D0713 05:28:05.330348 700060 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:05.331077 700060 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.331116 700060 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001bd71d0 2 D0713 05:28:05.331133 700060 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:05.331979 700060 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.332007 700060 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001bd71d0 3 D0713 05:28:05.332020 700060 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:05.340320 700060 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.340386 700060 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001bd71d0 4 D0713 05:28:05.340406 700060 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:05.341958 700060 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.341992 700060 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001bd71d0 5 D0713 05:28:05.342029 700060 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:05.342166 700060 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.342187 700060 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001bd71d0 6 D0713 05:28:05.342198 700060 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:05.342531 700060 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.342550 700060 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001bd71d0 7 D0713 05:28:05.342560 700060 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:05.342801 700060 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.342832 700060 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc001bd71d0 8 D0713 05:28:05.342852 700060 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:05.343140 700060 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.343176 700060 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001bd71d0 9 D0713 05:28:05.343193 700060 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:05.343222 700060 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.343229 700060 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc001bd71d0 10 D0713 05:28:05.343247 700060 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:05.351845 700060 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.351875 700060 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001bd71d0 11 D0713 05:28:05.351890 700060 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:05.354573 700060 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.354608 700060 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc001bd71d0 12 D0713 05:28:05.354624 700060 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:05.354698 700060 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.354728 700060 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc001bd71d0 13 D0713 05:28:05.354742 700060 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:05.354799 700060 task_signals.go:470] [ 628: 628] Notified of signal 23 D0713 05:28:05.354892 700060 task_signals.go:220] [ 628: 628] Signal 23: delivering to handler D0713 05:28:05.360239 700060 sampler.go:191] Time: Adjusting syscall overhead down to 875 I0713 05:28:05.362752 700060 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0713 05:28:05.362845 700060 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.362857 700060 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc001bd71d0 14 D0713 05:28:05.362874 700060 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:05.362958 700060 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.363000 700060 task_signals.go:204] [ 628: 629] Signal 628, PID: 629, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.363001 700060 task_signals.go:204] [ 628: 630] Signal 628, PID: 630, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.363073 700060 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.363074 700060 task_signals.go:204] [ 628: 631] Signal 628, PID: 631, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.363128 700060 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.363155 700060 task_signals.go:204] [ 628: 632] Signal 628, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.363181 700060 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.363190 700060 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.363204 700060 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.363236 700060 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.363242 700060 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.363253 700060 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.363262 700060 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.363268 700060 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.363277 700060 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.364711 700060 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.364738 700060 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.364753 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.364794 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.364827 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.364891 700060 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.365590 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.367288 700060 syscalls.go:262] [ 633: 633] Allocating stack with size of 8388608 bytes D0713 05:28:05.367410 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.368612 700060 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.368656 700060 usertrap_amd64.go:106] [ 633: 633] Map a usertrap vma at 62000 D0713 05:28:05.368784 700060 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009ae6f0 1 D0713 05:28:05.368817 700060 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:05.369154 700060 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.369178 700060 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009ae6f0 2 D0713 05:28:05.369188 700060 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:05.369604 700060 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.369633 700060 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009ae6f0 3 D0713 05:28:05.369645 700060 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:05.375329 700060 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.375343 700060 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009ae6f0 4 D0713 05:28:05.375358 700060 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:05.376463 700060 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.376490 700060 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009ae6f0 5 D0713 05:28:05.376499 700060 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:05.376548 700060 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.376566 700060 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009ae6f0 6 D0713 05:28:05.376574 700060 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:05.376811 700060 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.376834 700060 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009ae6f0 7 D0713 05:28:05.376842 700060 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:05.377024 700060 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.377049 700060 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc0009ae6f0 8 D0713 05:28:05.377059 700060 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:05.377204 700060 usertrap_amd64.go:212] [ 633: 635] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:05.377234 700060 usertrap_amd64.go:122] [ 633: 635] Allocate a new trap: 0xc0009ae6f0 9 D0713 05:28:05.377244 700060 usertrap_amd64.go:225] [ 633: 635] Apply the binary patch addr 46b6e0 trap addr 622d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:05.377257 700060 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.377264 700060 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc0009ae6f0 10 D0713 05:28:05.377273 700060 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:05.377286 700060 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.377293 700060 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009ae6f0 11 D0713 05:28:05.377302 700060 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b57c trap addr 62370 ([184 202 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:05.377865 700060 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.377893 700060 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc0009ae6f0 12 D0713 05:28:05.377907 700060 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:05.377925 700060 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.377932 700060 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc0009ae6f0 13 D0713 05:28:05.377939 700060 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:05.378005 700060 task_signals.go:470] [ 633: 633] Notified of signal 23 D0713 05:28:05.378040 700060 task_signals.go:220] [ 633: 633] Signal 23: delivering to handler D0713 05:28:05.385207 700060 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.385238 700060 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009ae6f0 14 D0713 05:28:05.385248 700060 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46af29 trap addr 62460 ([184 37 1 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:05.388294 700060 task_signals.go:470] [ 633: 633] Notified of signal 23 D0713 05:28:05.388380 700060 task_signals.go:220] [ 633: 633] Signal 23: delivering to handler I0713 05:28:05.396579 700060 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0713 05:28:05.396666 700060 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.396691 700060 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc0009ae6f0 15 D0713 05:28:05.396701 700060 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 05:28:05.396761 700060 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.396786 700060 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.396809 700060 task_signals.go:204] [ 633: 636] Signal 633, PID: 636, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.396842 700060 task_exit.go:204] [ 633: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.396818 700060 task_signals.go:204] [ 633: 635] Signal 633, PID: 635, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.396843 700060 task_signals.go:204] [ 633: 634] Signal 633, PID: 634, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.396886 700060 task_exit.go:204] [ 633: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.396904 700060 task_exit.go:204] [ 633: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.396929 700060 task_signals.go:204] [ 633: 637] Signal 633, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.396949 700060 task_exit.go:204] [ 633: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.396986 700060 task_exit.go:204] [ 633: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.397001 700060 task_exit.go:204] [ 633: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.397016 700060 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.397023 700060 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.397027 700060 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.397035 700060 task_exit.go:204] [ 633: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.398159 700060 task_exit.go:204] [ 633: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.398187 700060 task_exit.go:204] [ 633: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.398199 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.398225 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.398235 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.398442 700060 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.398917 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.400362 700060 syscalls.go:262] [ 638: 638] Allocating stack with size of 8388608 bytes D0713 05:28:05.400479 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.402105 700060 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.402207 700060 usertrap_amd64.go:106] [ 638: 638] Map a usertrap vma at 6a000 D0713 05:28:05.402330 700060 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001bd72c0 1 D0713 05:28:05.402365 700060 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:05.402635 700060 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.402710 700060 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001bd72c0 2 D0713 05:28:05.402732 700060 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:05.403255 700060 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.403275 700060 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001bd72c0 3 D0713 05:28:05.403282 700060 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:05.410674 700060 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.410705 700060 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001bd72c0 4 D0713 05:28:05.410719 700060 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:05.411970 700060 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.411986 700060 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001bd72c0 5 D0713 05:28:05.411998 700060 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:05.412069 700060 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.412087 700060 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001bd72c0 6 D0713 05:28:05.412095 700060 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:05.412305 700060 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.412314 700060 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001bd72c0 7 D0713 05:28:05.412322 700060 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:05.412456 700060 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.412480 700060 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc001bd72c0 8 D0713 05:28:05.412492 700060 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:05.412620 700060 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.412642 700060 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc001bd72c0 9 D0713 05:28:05.412665 700060 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:05.412879 700060 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.412990 700060 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001bd72c0 10 D0713 05:28:05.413051 700060 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:05.421180 700060 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.421204 700060 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001bd72c0 11 D0713 05:28:05.421213 700060 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:05.423728 700060 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.423757 700060 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc001bd72c0 12 D0713 05:28:05.423771 700060 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:05.423813 700060 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.423822 700060 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc001bd72c0 13 D0713 05:28:05.423845 700060 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:05.423899 700060 task_signals.go:470] [ 638: 638] Notified of signal 23 D0713 05:28:05.424010 700060 task_signals.go:220] [ 638: 638] Signal 23: delivering to handler I0713 05:28:05.432802 700060 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0713 05:28:05.432901 700060 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.432912 700060 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc001bd72c0 14 D0713 05:28:05.432925 700060 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:05.433009 700060 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.433044 700060 task_signals.go:204] [ 638: 640] Signal 638, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.433047 700060 task_signals.go:204] [ 638: 639] Signal 638, PID: 639, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.433063 700060 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.433097 700060 task_signals.go:204] [ 638: 641] Signal 638, PID: 641, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.433112 700060 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.433121 700060 task_signals.go:204] [ 638: 642] Signal 638, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.433135 700060 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.433143 700060 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.433156 700060 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.433180 700060 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.433187 700060 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.433197 700060 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.433204 700060 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.433210 700060 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.433220 700060 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.434465 700060 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.434503 700060 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.434519 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.434591 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.434681 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.434676 700060 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.435539 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.437206 700060 syscalls.go:262] [ 643: 643] Allocating stack with size of 8388608 bytes D0713 05:28:05.437373 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.438401 700060 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.438443 700060 usertrap_amd64.go:106] [ 643: 643] Map a usertrap vma at 66000 D0713 05:28:05.438666 700060 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001c48de0 1 D0713 05:28:05.438700 700060 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:05.438907 700060 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.438927 700060 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001c48de0 2 D0713 05:28:05.438937 700060 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:05.439579 700060 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.439610 700060 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001c48de0 3 D0713 05:28:05.439623 700060 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:05.447592 700060 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.447666 700060 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001c48de0 4 D0713 05:28:05.447689 700060 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:05.449217 700060 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.449260 700060 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001c48de0 5 D0713 05:28:05.449277 700060 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:05.449340 700060 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.449365 700060 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001c48de0 6 D0713 05:28:05.449382 700060 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:05.449826 700060 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.449842 700060 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001c48de0 7 D0713 05:28:05.449849 700060 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:05.450022 700060 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.450052 700060 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc001c48de0 8 D0713 05:28:05.450061 700060 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:05.450310 700060 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.450327 700060 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc001c48de0 9 D0713 05:28:05.450335 700060 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:05.450530 700060 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.450580 700060 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001c48de0 10 D0713 05:28:05.450622 700060 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:05.459830 700060 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.459895 700060 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001c48de0 11 D0713 05:28:05.459911 700060 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:05.461331 700060 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.461401 700060 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc001c48de0 12 D0713 05:28:05.461419 700060 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:05.463922 700060 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.463958 700060 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc001c48de0 13 D0713 05:28:05.463971 700060 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:05.464069 700060 task_signals.go:470] [ 643: 643] Notified of signal 23 D0713 05:28:05.464170 700060 task_signals.go:220] [ 643: 643] Signal 23: delivering to handler D0713 05:28:05.473250 700060 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.473283 700060 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc001c48de0 14 D0713 05:28:05.473294 700060 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:05.473342 700060 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.473373 700060 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.473380 700060 task_signals.go:204] [ 643: 644] Signal 643, PID: 644, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.473416 700060 task_signals.go:204] [ 643: 646] Signal 643, PID: 646, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.473403 700060 task_signals.go:204] [ 643: 647] Signal 643, PID: 647, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.473425 700060 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.473437 700060 task_exit.go:204] [ 643: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.473460 700060 task_exit.go:204] [ 643: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.473469 700060 task_exit.go:204] [ 643: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.473497 700060 task_exit.go:204] [ 643: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.473509 700060 task_exit.go:204] [ 643: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.473525 700060 task_exit.go:204] [ 643: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.473421 700060 task_signals.go:204] [ 643: 645] Signal 643, PID: 645, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.473559 700060 task_exit.go:204] [ 643: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.473622 700060 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.473649 700060 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.474873 700060 task_exit.go:204] [ 643: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.474904 700060 task_exit.go:204] [ 643: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.474916 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.474942 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.474950 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.475020 700060 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.475119 700060 task_signals.go:470] [ 5: 7] Notified of signal 23 D0713 05:28:05.475147 700060 task_signals.go:220] [ 5: 7] Signal 23: delivering to handler D0713 05:28:05.475613 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.477192 700060 syscalls.go:262] [ 648: 648] Allocating stack with size of 8388608 bytes D0713 05:28:05.477318 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.478982 700060 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.479022 700060 usertrap_amd64.go:106] [ 648: 648] Map a usertrap vma at 68000 D0713 05:28:05.479145 700060 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0012a4000 1 D0713 05:28:05.479172 700060 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:05.479480 700060 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.479504 700060 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0012a4000 2 D0713 05:28:05.479515 700060 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:05.480190 700060 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.480217 700060 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0012a4000 3 D0713 05:28:05.480228 700060 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:05.487683 700060 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.487766 700060 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0012a4000 4 D0713 05:28:05.487790 700060 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:05.489095 700060 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.489152 700060 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0012a4000 5 D0713 05:28:05.489169 700060 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:05.489295 700060 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.489317 700060 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0012a4000 6 D0713 05:28:05.489328 700060 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:05.489631 700060 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.489663 700060 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0012a4000 7 D0713 05:28:05.489677 700060 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:05.489896 700060 usertrap_amd64.go:212] [ 648: 649] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.489923 700060 usertrap_amd64.go:122] [ 648: 649] Allocate a new trap: 0xc0012a4000 8 D0713 05:28:05.489937 700060 usertrap_amd64.go:225] [ 648: 649] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:05.490159 700060 usertrap_amd64.go:212] [ 648: 649] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.490190 700060 usertrap_amd64.go:122] [ 648: 649] Allocate a new trap: 0xc0012a4000 9 D0713 05:28:05.490205 700060 usertrap_amd64.go:225] [ 648: 649] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:05.490271 700060 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.490293 700060 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0012a4000 10 D0713 05:28:05.490306 700060 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:05.500020 700060 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.500045 700060 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0012a4000 11 D0713 05:28:05.500055 700060 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:05.500503 700060 usertrap_amd64.go:212] [ 648: 649] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.500531 700060 usertrap_amd64.go:122] [ 648: 649] Allocate a new trap: 0xc0012a4000 12 D0713 05:28:05.500544 700060 usertrap_amd64.go:225] [ 648: 649] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:05.500613 700060 usertrap_amd64.go:212] [ 648: 649] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.500647 700060 usertrap_amd64.go:122] [ 648: 649] Allocate a new trap: 0xc0012a4000 13 D0713 05:28:05.500664 700060 usertrap_amd64.go:225] [ 648: 649] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:05.500705 700060 task_signals.go:470] [ 648: 648] Notified of signal 23 D0713 05:28:05.500901 700060 task_signals.go:220] [ 648: 648] Signal 23: delivering to handler D0713 05:28:05.511263 700060 task_signals.go:470] [ 648: 648] Notified of signal 23 D0713 05:28:05.512745 700060 task_signals.go:220] [ 648: 648] Signal 23: delivering to handler I0713 05:28:05.513285 700060 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0713 05:28:05.513406 700060 usertrap_amd64.go:212] [ 648: 648] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.513430 700060 usertrap_amd64.go:122] [ 648: 648] Allocate a new trap: 0xc0012a4000 14 D0713 05:28:05.513444 700060 usertrap_amd64.go:225] [ 648: 648] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:05.513510 700060 task_exit.go:204] [ 648: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.513534 700060 task_exit.go:204] [ 648: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.513559 700060 task_signals.go:204] [ 648: 652] Signal 648, PID: 652, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.513575 700060 task_signals.go:204] [ 648: 651] Signal 648, PID: 651, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.513583 700060 task_exit.go:204] [ 648: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.513601 700060 task_exit.go:204] [ 648: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.513615 700060 task_exit.go:204] [ 648: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.513562 700060 task_signals.go:204] [ 648: 650] Signal 648, PID: 650, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.513642 700060 task_exit.go:204] [ 648: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.513668 700060 task_signals.go:204] [ 648: 649] Signal 648, PID: 649, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.513685 700060 task_exit.go:204] [ 648: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.513700 700060 task_exit.go:204] [ 648: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.513714 700060 task_exit.go:204] [ 648: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.513722 700060 task_exit.go:204] [ 648: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.513728 700060 task_exit.go:204] [ 648: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.513738 700060 task_exit.go:204] [ 648: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.515184 700060 task_exit.go:204] [ 648: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.515260 700060 task_exit.go:204] [ 648: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.515281 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.515344 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.515364 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.515398 700060 task_exit.go:204] [ 648: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.516002 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.517857 700060 syscalls.go:262] [ 653: 653] Allocating stack with size of 8388608 bytes D0713 05:28:05.517985 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.518599 700060 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.518681 700060 usertrap_amd64.go:106] [ 653: 653] Map a usertrap vma at 69000 D0713 05:28:05.525138 700060 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001bd7a40 1 D0713 05:28:05.525260 700060 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:05.525739 700060 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.525776 700060 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001bd7a40 2 D0713 05:28:05.525793 700060 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:05.526573 700060 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.526614 700060 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001bd7a40 3 D0713 05:28:05.526646 700060 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:05.533022 700060 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.533059 700060 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001bd7a40 4 D0713 05:28:05.533073 700060 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:05.536714 700060 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.536763 700060 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001bd7a40 5 D0713 05:28:05.536782 700060 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:05.536848 700060 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.536861 700060 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001bd7a40 6 D0713 05:28:05.536869 700060 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:05.537433 700060 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.537465 700060 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001bd7a40 7 D0713 05:28:05.537488 700060 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:05.537803 700060 usertrap_amd64.go:212] [ 653: 654] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.537847 700060 usertrap_amd64.go:122] [ 653: 654] Allocate a new trap: 0xc001bd7a40 8 D0713 05:28:05.537865 700060 usertrap_amd64.go:225] [ 653: 654] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:05.538190 700060 usertrap_amd64.go:212] [ 653: 654] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.538220 700060 usertrap_amd64.go:122] [ 653: 654] Allocate a new trap: 0xc001bd7a40 9 D0713 05:28:05.538233 700060 usertrap_amd64.go:225] [ 653: 654] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:05.538962 700060 usertrap_amd64.go:212] [ 653: 656] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.539162 700060 usertrap_amd64.go:122] [ 653: 656] Allocate a new trap: 0xc001bd7a40 10 D0713 05:28:05.539232 700060 usertrap_amd64.go:225] [ 653: 656] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:05.548077 700060 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.548123 700060 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001bd7a40 11 D0713 05:28:05.548145 700060 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:05.551747 700060 usertrap_amd64.go:212] [ 653: 654] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.551811 700060 usertrap_amd64.go:122] [ 653: 654] Allocate a new trap: 0xc001bd7a40 12 D0713 05:28:05.551851 700060 usertrap_amd64.go:225] [ 653: 654] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:05.551907 700060 usertrap_amd64.go:212] [ 653: 654] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.551917 700060 usertrap_amd64.go:122] [ 653: 654] Allocate a new trap: 0xc001bd7a40 13 D0713 05:28:05.551928 700060 usertrap_amd64.go:225] [ 653: 654] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:05.551953 700060 task_signals.go:470] [ 653: 653] Notified of signal 23 D0713 05:28:05.552079 700060 task_signals.go:220] [ 653: 653] Signal 23: delivering to handler I0713 05:28:05.562858 700060 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0713 05:28:05.563426 700060 task_signals.go:470] [ 653: 653] Notified of signal 23 D0713 05:28:05.563499 700060 usertrap_amd64.go:212] [ 653: 653] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.563523 700060 usertrap_amd64.go:122] [ 653: 653] Allocate a new trap: 0xc001bd7a40 14 D0713 05:28:05.563578 700060 usertrap_amd64.go:225] [ 653: 653] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:05.563600 700060 task_signals.go:220] [ 653: 653] Signal 23: delivering to handler D0713 05:28:05.563882 700060 task_exit.go:204] [ 653: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.563963 700060 task_exit.go:204] [ 653: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.563996 700060 task_signals.go:204] [ 653: 656] Signal 653, PID: 656, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.564030 700060 task_exit.go:204] [ 653: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.564041 700060 task_exit.go:204] [ 653: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.564048 700060 task_exit.go:204] [ 653: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.564022 700060 task_signals.go:204] [ 653: 654] Signal 653, PID: 654, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.564063 700060 task_exit.go:204] [ 653: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.564080 700060 task_exit.go:204] [ 653: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.564099 700060 task_exit.go:204] [ 653: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.563996 700060 task_signals.go:204] [ 653: 655] Signal 653, PID: 655, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.564131 700060 task_signals.go:204] [ 653: 657] Signal 653, PID: 657, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.564154 700060 task_exit.go:204] [ 653: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.564164 700060 task_signals.go:204] [ 653: 658] Signal 653, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.564174 700060 task_exit.go:204] [ 653: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.564178 700060 task_exit.go:204] [ 653: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.564187 700060 task_exit.go:204] [ 653: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.564200 700060 task_exit.go:204] [ 653: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.564205 700060 task_exit.go:204] [ 653: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.564213 700060 task_exit.go:204] [ 653: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.565973 700060 task_exit.go:204] [ 653: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.566017 700060 task_exit.go:204] [ 653: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.566051 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.570022 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.570041 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.579289 700060 task_exit.go:204] [ 653: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.596476 700060 task_signals.go:470] [ 5: 8] Notified of signal 23 D0713 05:28:05.600204 700060 task_signals.go:220] [ 5: 8] Signal 23: delivering to handler D0713 05:28:05.687639 700060 task_signals.go:470] [ 5: 8] Notified of signal 23 D0713 05:28:05.687787 700060 task_signals.go:220] [ 5: 8] Signal 23: delivering to handler D0713 05:28:05.711080 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.712558 700060 syscalls.go:262] [ 659: 659] Allocating stack with size of 8388608 bytes D0713 05:28:05.712671 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.730756 700060 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.730815 700060 usertrap_amd64.go:106] [ 659: 659] Map a usertrap vma at 69000 D0713 05:28:05.730892 700060 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001bd7d10 1 D0713 05:28:05.730919 700060 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:05.731164 700060 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.731178 700060 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001bd7d10 2 D0713 05:28:05.731186 700060 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:05.732002 700060 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.732029 700060 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001bd7d10 3 D0713 05:28:05.732043 700060 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:05.767164 700060 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.767228 700060 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001bd7d10 4 D0713 05:28:05.767255 700060 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:05.790506 700060 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.790565 700060 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001bd7d10 5 D0713 05:28:05.790585 700060 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:05.796579 700060 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.796607 700060 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001bd7d10 6 D0713 05:28:05.796621 700060 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:05.796913 700060 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.796965 700060 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001bd7d10 7 D0713 05:28:05.796975 700060 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:05.797259 700060 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.797282 700060 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc001bd7d10 8 D0713 05:28:05.797294 700060 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:05.797581 700060 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.797593 700060 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc001bd7d10 9 D0713 05:28:05.797601 700060 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:05.797625 700060 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.797630 700060 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001bd7d10 10 D0713 05:28:05.797636 700060 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:05.811574 700060 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.811661 700060 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc001bd7d10 11 D0713 05:28:05.811691 700060 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:05.811862 700060 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.811885 700060 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc001bd7d10 12 D0713 05:28:05.811906 700060 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:05.814444 700060 task_signals.go:470] [ 659: 659] Notified of signal 23 D0713 05:28:05.814653 700060 task_signals.go:220] [ 659: 659] Signal 23: delivering to handler D0713 05:28:05.820524 700060 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.820561 700060 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001bd7d10 13 D0713 05:28:05.820577 700060 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) I0713 05:28:05.834346 700060 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0713 05:28:05.834597 700060 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.834843 700060 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc001bd7d10 14 D0713 05:28:05.834877 700060 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:05.834807 700060 task_signals.go:470] [ 659: 659] Notified of signal 23 D0713 05:28:05.835049 700060 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.835089 700060 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.835123 700060 task_signals.go:204] [ 659: 660] Signal 659, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.835218 700060 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.835244 700060 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.835253 700060 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.835142 700060 task_signals.go:204] [ 659: 662] Signal 659, PID: 662, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.835346 700060 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.835421 700060 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.835440 700060 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.835183 700060 task_signals.go:204] [ 659: 663] Signal 659, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.835478 700060 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.835545 700060 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.835570 700060 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.835168 700060 task_signals.go:204] [ 659: 661] Signal 659, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.835613 700060 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.837190 700060 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.837222 700060 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.837240 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.838305 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.838335 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.838534 700060 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.839092 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.840913 700060 syscalls.go:262] [ 664: 664] Allocating stack with size of 8388608 bytes D0713 05:28:05.841151 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.845618 700060 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.846262 700060 usertrap_amd64.go:106] [ 664: 664] Map a usertrap vma at 64000 D0713 05:28:05.846480 700060 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc001bd7dd0 1 D0713 05:28:05.846541 700060 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:05.853451 700060 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.853493 700060 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc001bd7dd0 2 D0713 05:28:05.853509 700060 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:05.868618 700060 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.868673 700060 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc001bd7dd0 3 D0713 05:28:05.868695 700060 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:05.894107 700060 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.894180 700060 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc001bd7dd0 4 D0713 05:28:05.894198 700060 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:05.895459 700060 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.895541 700060 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc001bd7dd0 5 D0713 05:28:05.895565 700060 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:05.895674 700060 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.895686 700060 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc001bd7dd0 6 D0713 05:28:05.895697 700060 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:05.896049 700060 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.896096 700060 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc001bd7dd0 7 D0713 05:28:05.896121 700060 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:05.896387 700060 usertrap_amd64.go:212] [ 664: 665] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.896431 700060 usertrap_amd64.go:122] [ 664: 665] Allocate a new trap: 0xc001bd7dd0 8 D0713 05:28:05.896451 700060 usertrap_amd64.go:225] [ 664: 665] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:05.896713 700060 usertrap_amd64.go:212] [ 664: 665] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.896801 700060 usertrap_amd64.go:122] [ 664: 665] Allocate a new trap: 0xc001bd7dd0 9 D0713 05:28:05.896827 700060 usertrap_amd64.go:225] [ 664: 665] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:05.897040 700060 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.897091 700060 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc001bd7dd0 10 D0713 05:28:05.897107 700060 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:05.904870 700060 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.904906 700060 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc001bd7dd0 11 D0713 05:28:05.904920 700060 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:05.908246 700060 usertrap_amd64.go:212] [ 664: 665] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.908423 700060 usertrap_amd64.go:122] [ 664: 665] Allocate a new trap: 0xc001bd7dd0 12 D0713 05:28:05.908467 700060 usertrap_amd64.go:225] [ 664: 665] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:05.908614 700060 usertrap_amd64.go:212] [ 664: 665] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.908707 700060 usertrap_amd64.go:122] [ 664: 665] Allocate a new trap: 0xc001bd7dd0 13 D0713 05:28:05.908737 700060 usertrap_amd64.go:225] [ 664: 665] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:05.908806 700060 task_signals.go:470] [ 664: 664] Notified of signal 23 D0713 05:28:05.908892 700060 task_signals.go:220] [ 664: 664] Signal 23: delivering to handler D0713 05:28:05.916268 700060 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.916307 700060 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc001bd7dd0 14 D0713 05:28:05.916323 700060 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:05.916396 700060 task_exit.go:204] [ 664: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.916451 700060 task_exit.go:204] [ 664: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.916451 700060 task_signals.go:204] [ 664: 665] Signal 664, PID: 665, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.916501 700060 task_signals.go:204] [ 664: 667] Signal 664, PID: 667, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.916532 700060 task_exit.go:204] [ 664: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.916556 700060 task_exit.go:204] [ 664: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.916563 700060 task_exit.go:204] [ 664: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.916534 700060 task_signals.go:204] [ 664: 668] Signal 664, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.916583 700060 task_exit.go:204] [ 664: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.916581 700060 task_signals.go:204] [ 664: 666] Signal 664, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.916627 700060 task_exit.go:204] [ 664: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.916650 700060 task_exit.go:204] [ 664: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.916664 700060 task_exit.go:204] [ 664: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.916670 700060 task_exit.go:204] [ 664: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.916686 700060 task_exit.go:204] [ 664: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.916691 700060 task_exit.go:204] [ 664: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.917925 700060 task_exit.go:204] [ 664: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.917968 700060 task_exit.go:204] [ 664: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.917986 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.918040 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.918075 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.918203 700060 task_exit.go:204] [ 664: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.918820 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.920347 700060 syscalls.go:262] [ 669: 669] Allocating stack with size of 8388608 bytes D0713 05:28:05.920485 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.921710 700060 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.921765 700060 usertrap_amd64.go:106] [ 669: 669] Map a usertrap vma at 65000 D0713 05:28:05.921904 700060 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc000c240f0 1 D0713 05:28:05.921965 700060 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:05.922350 700060 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.922377 700060 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc000c240f0 2 D0713 05:28:05.922391 700060 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:05.923149 700060 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.923180 700060 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc000c240f0 3 D0713 05:28:05.923196 700060 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:05.929343 700060 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.929382 700060 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc000c240f0 4 D0713 05:28:05.929393 700060 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:05.930424 700060 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.930457 700060 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc000c240f0 5 D0713 05:28:05.930470 700060 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:05.930545 700060 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.930557 700060 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc000c240f0 6 D0713 05:28:05.930565 700060 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:05.930784 700060 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.930809 700060 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc000c240f0 7 D0713 05:28:05.930817 700060 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:05.931021 700060 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.931044 700060 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc000c240f0 8 D0713 05:28:05.931056 700060 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:05.931413 700060 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.931443 700060 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc000c240f0 9 D0713 05:28:05.931454 700060 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:05.931469 700060 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.931476 700060 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc000c240f0 10 D0713 05:28:05.931506 700060 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:05.931673 700060 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:05.931745 700060 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc000c240f0 11 D0713 05:28:05.931850 700060 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:05.938902 700060 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.938930 700060 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc000c240f0 12 D0713 05:28:05.938940 700060 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:05.942640 700060 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.942673 700060 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc000c240f0 13 D0713 05:28:05.942685 700060 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:05.942854 700060 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.942916 700060 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc000c240f0 14 D0713 05:28:05.942936 700060 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:05.943016 700060 task_signals.go:470] [ 669: 669] Notified of signal 23 D0713 05:28:05.943081 700060 task_signals.go:220] [ 669: 669] Signal 23: delivering to handler D0713 05:28:05.948523 700060 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.948543 700060 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc000c240f0 15 D0713 05:28:05.948556 700060 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 05:28:05.948641 700060 task_exit.go:204] [ 669: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.948719 700060 task_exit.go:204] [ 669: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.948784 700060 task_signals.go:204] [ 669: 673] Signal 669, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.948809 700060 task_exit.go:204] [ 669: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.948806 700060 task_signals.go:204] [ 669: 671] Signal 669, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.948825 700060 task_exit.go:204] [ 669: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.948841 700060 task_exit.go:204] [ 669: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.948865 700060 task_signals.go:204] [ 669: 672] Signal 669, PID: 672, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.948881 700060 task_exit.go:204] [ 669: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.948880 700060 task_signals.go:204] [ 669: 670] Signal 669, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.948891 700060 task_exit.go:204] [ 669: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.948907 700060 task_exit.go:204] [ 669: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.948919 700060 task_exit.go:204] [ 669: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.948988 700060 task_exit.go:204] [ 669: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.949116 700060 task_exit.go:204] [ 669: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.949150 700060 task_exit.go:204] [ 669: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.950168 700060 task_exit.go:204] [ 669: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.950191 700060 task_exit.go:204] [ 669: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.950206 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.950240 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.950250 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.950390 700060 task_exit.go:204] [ 669: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.951153 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.952655 700060 syscalls.go:262] [ 674: 674] Allocating stack with size of 8388608 bytes D0713 05:28:05.952931 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.953957 700060 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.954020 700060 usertrap_amd64.go:106] [ 674: 674] Map a usertrap vma at 64000 D0713 05:28:05.954151 700060 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000b28c60 1 D0713 05:28:05.954192 700060 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:05.954601 700060 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.954641 700060 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000b28c60 2 D0713 05:28:05.954652 700060 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:05.956062 700060 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.956099 700060 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000b28c60 3 D0713 05:28:05.956113 700060 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:05.963292 700060 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.963342 700060 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000b28c60 4 D0713 05:28:05.963363 700060 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:05.965186 700060 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.965227 700060 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000b28c60 5 D0713 05:28:05.965243 700060 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:05.966406 700060 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.966442 700060 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000b28c60 6 D0713 05:28:05.966457 700060 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:05.968124 700060 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.968175 700060 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000b28c60 7 D0713 05:28:05.968194 700060 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:05.968653 700060 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.968712 700060 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc000b28c60 8 D0713 05:28:05.968728 700060 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:05.969212 700060 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.969245 700060 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000b28c60 9 D0713 05:28:05.969259 700060 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:05.969339 700060 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.969348 700060 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc000b28c60 10 D0713 05:28:05.969354 700060 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:05.969884 700060 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.969917 700060 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc000b28c60 11 D0713 05:28:05.969930 700060 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:05.970002 700060 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.970007 700060 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc000b28c60 12 D0713 05:28:05.970021 700060 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:05.970039 700060 task_signals.go:470] [ 674: 674] Notified of signal 23 D0713 05:28:05.970131 700060 task_signals.go:220] [ 674: 674] Signal 23: delivering to handler D0713 05:28:05.977044 700060 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.977079 700060 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000b28c60 13 D0713 05:28:05.977094 700060 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:05.980914 700060 task_signals.go:470] [ 674: 674] Notified of signal 23 D0713 05:28:05.981012 700060 task_signals.go:220] [ 674: 674] Signal 23: delivering to handler D0713 05:28:05.987538 700060 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.987575 700060 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000b28c60 14 D0713 05:28:05.987589 700060 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:05.987655 700060 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.987680 700060 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.987707 700060 task_signals.go:204] [ 674: 677] Signal 674, PID: 677, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.987708 700060 task_signals.go:204] [ 674: 676] Signal 674, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.987745 700060 task_signals.go:204] [ 674: 678] Signal 674, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.987747 700060 task_exit.go:204] [ 674: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.987742 700060 task_signals.go:204] [ 674: 675] Signal 674, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.987767 700060 task_exit.go:204] [ 674: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.987778 700060 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.987813 700060 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.987822 700060 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.987846 700060 task_exit.go:204] [ 674: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.987893 700060 task_exit.go:204] [ 674: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.987927 700060 task_exit.go:204] [ 674: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.987971 700060 task_exit.go:204] [ 674: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.987992 700060 task_exit.go:204] [ 674: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.988976 700060 task_exit.go:204] [ 674: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.989012 700060 task_exit.go:204] [ 674: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.989029 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:05.989061 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.989088 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:05.989200 700060 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.990040 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.991779 700060 syscalls.go:262] [ 679: 679] Allocating stack with size of 8388608 bytes D0713 05:28:05.991913 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.992738 700060 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.992764 700060 usertrap_amd64.go:106] [ 679: 679] Map a usertrap vma at 62000 D0713 05:28:05.992900 700060 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc0012a4a20 1 D0713 05:28:05.992933 700060 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:05.993332 700060 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.993363 700060 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc0012a4a20 2 D0713 05:28:05.993378 700060 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:05.993913 700060 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.993940 700060 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc0012a4a20 3 D0713 05:28:05.993958 700060 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:06.001138 700060 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.001212 700060 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc0012a4a20 4 D0713 05:28:06.001234 700060 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:06.002707 700060 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.002745 700060 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc0012a4a20 5 D0713 05:28:06.002762 700060 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:06.002813 700060 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.002823 700060 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc0012a4a20 6 D0713 05:28:06.002832 700060 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:06.003774 700060 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.003822 700060 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc0012a4a20 7 D0713 05:28:06.003843 700060 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:06.004221 700060 usertrap_amd64.go:212] [ 679: 680] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.004254 700060 usertrap_amd64.go:122] [ 679: 680] Allocate a new trap: 0xc0012a4a20 8 D0713 05:28:06.004265 700060 usertrap_amd64.go:225] [ 679: 680] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:06.004544 700060 usertrap_amd64.go:212] [ 679: 680] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.004556 700060 usertrap_amd64.go:122] [ 679: 680] Allocate a new trap: 0xc0012a4a20 9 D0713 05:28:06.004564 700060 usertrap_amd64.go:225] [ 679: 680] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:06.004664 700060 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.004773 700060 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc0012a4a20 10 D0713 05:28:06.004851 700060 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:06.012870 700060 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.012917 700060 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc0012a4a20 11 D0713 05:28:06.012932 700060 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:06.016217 700060 usertrap_amd64.go:212] [ 679: 680] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.016256 700060 usertrap_amd64.go:122] [ 679: 680] Allocate a new trap: 0xc0012a4a20 12 D0713 05:28:06.016274 700060 usertrap_amd64.go:225] [ 679: 680] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:06.016449 700060 usertrap_amd64.go:212] [ 679: 680] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.016468 700060 usertrap_amd64.go:122] [ 679: 680] Allocate a new trap: 0xc0012a4a20 13 D0713 05:28:06.016481 700060 usertrap_amd64.go:225] [ 679: 680] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:06.016505 700060 task_signals.go:470] [ 679: 679] Notified of signal 23 D0713 05:28:06.016589 700060 task_signals.go:220] [ 679: 679] Signal 23: delivering to handler D0713 05:28:06.023578 700060 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.023608 700060 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc0012a4a20 14 D0713 05:28:06.023620 700060 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:06.023689 700060 task_exit.go:204] [ 679: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.023721 700060 task_exit.go:204] [ 679: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.023762 700060 task_signals.go:204] [ 679: 682] Signal 679, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.023756 700060 task_signals.go:204] [ 679: 681] Signal 679, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.023782 700060 task_exit.go:204] [ 679: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.023793 700060 task_exit.go:204] [ 679: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.023800 700060 task_exit.go:204] [ 679: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.023786 700060 task_signals.go:204] [ 679: 680] Signal 679, PID: 680, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.023819 700060 task_exit.go:204] [ 679: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.023832 700060 task_signals.go:204] [ 679: 683] Signal 679, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.023847 700060 task_exit.go:204] [ 679: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.023851 700060 task_exit.go:204] [ 679: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.023861 700060 task_exit.go:204] [ 679: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.023872 700060 task_exit.go:204] [ 679: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.023881 700060 task_exit.go:204] [ 679: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.023894 700060 task_exit.go:204] [ 679: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.025273 700060 task_exit.go:204] [ 679: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.025299 700060 task_exit.go:204] [ 679: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.025314 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.025346 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.025370 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.025531 700060 task_exit.go:204] [ 679: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.026217 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.027407 700060 syscalls.go:262] [ 684: 684] Allocating stack with size of 8388608 bytes D0713 05:28:06.027520 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.029231 700060 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.029263 700060 usertrap_amd64.go:106] [ 684: 684] Map a usertrap vma at 68000 D0713 05:28:06.029379 700060 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0009aef00 1 D0713 05:28:06.029421 700060 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:06.029725 700060 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.029737 700060 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0009aef00 2 D0713 05:28:06.029744 700060 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:06.030448 700060 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.030476 700060 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0009aef00 3 D0713 05:28:06.030489 700060 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:06.036308 700060 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.036351 700060 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0009aef00 4 D0713 05:28:06.036365 700060 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:06.037761 700060 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.037796 700060 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0009aef00 5 D0713 05:28:06.037807 700060 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:06.037907 700060 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.037924 700060 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0009aef00 6 D0713 05:28:06.037932 700060 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:06.038295 700060 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.038327 700060 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0009aef00 7 D0713 05:28:06.038339 700060 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:06.038515 700060 usertrap_amd64.go:212] [ 684: 685] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.038539 700060 usertrap_amd64.go:122] [ 684: 685] Allocate a new trap: 0xc0009aef00 8 D0713 05:28:06.038549 700060 usertrap_amd64.go:225] [ 684: 685] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:06.038679 700060 usertrap_amd64.go:212] [ 684: 685] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:06.038713 700060 usertrap_amd64.go:122] [ 684: 685] Allocate a new trap: 0xc0009aef00 9 D0713 05:28:06.038728 700060 usertrap_amd64.go:225] [ 684: 685] Apply the binary patch addr 46b6e0 trap addr 682d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:06.038831 700060 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.038850 700060 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0009aef00 10 D0713 05:28:06.038861 700060 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:06.039018 700060 usertrap_amd64.go:212] [ 684: 685] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.039041 700060 usertrap_amd64.go:122] [ 684: 685] Allocate a new trap: 0xc0009aef00 11 D0713 05:28:06.039055 700060 usertrap_amd64.go:225] [ 684: 685] Apply the binary patch addr 46af76 trap addr 68370 ([184 35 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:06.039512 700060 usertrap_amd64.go:212] [ 684: 685] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.039621 700060 usertrap_amd64.go:122] [ 684: 685] Allocate a new trap: 0xc0009aef00 12 D0713 05:28:06.039637 700060 usertrap_amd64.go:225] [ 684: 685] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:06.039853 700060 usertrap_amd64.go:212] [ 684: 685] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.039883 700060 usertrap_amd64.go:122] [ 684: 685] Allocate a new trap: 0xc0009aef00 13 D0713 05:28:06.039893 700060 usertrap_amd64.go:225] [ 684: 685] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:06.039922 700060 task_signals.go:470] [ 684: 684] Notified of signal 23 D0713 05:28:06.039977 700060 task_signals.go:220] [ 684: 684] Signal 23: delivering to handler D0713 05:28:06.046666 700060 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.046697 700060 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0009aef00 14 D0713 05:28:06.046711 700060 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46af29 trap addr 68460 ([184 37 1 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:06.050170 700060 task_signals.go:470] [ 684: 684] Notified of signal 23 D0713 05:28:06.050242 700060 task_signals.go:220] [ 684: 684] Signal 23: delivering to handler D0713 05:28:06.058344 700060 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.058394 700060 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc0009aef00 15 D0713 05:28:06.058413 700060 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 05:28:06.058469 700060 task_exit.go:204] [ 684: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.058508 700060 task_exit.go:204] [ 684: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.058565 700060 task_signals.go:204] [ 684: 687] Signal 684, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.058611 700060 task_exit.go:204] [ 684: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.058611 700060 task_signals.go:204] [ 684: 686] Signal 684, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.058631 700060 task_exit.go:204] [ 684: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.058658 700060 task_exit.go:204] [ 684: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.058695 700060 task_signals.go:204] [ 684: 688] Signal 684, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.058715 700060 task_exit.go:204] [ 684: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.058728 700060 task_signals.go:204] [ 684: 685] Signal 684, PID: 685, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.058749 700060 task_exit.go:204] [ 684: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.058760 700060 task_exit.go:204] [ 684: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.058772 700060 task_exit.go:204] [ 684: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.058783 700060 task_exit.go:204] [ 684: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.058789 700060 task_exit.go:204] [ 684: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.058799 700060 task_exit.go:204] [ 684: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.059869 700060 task_exit.go:204] [ 684: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.059892 700060 task_exit.go:204] [ 684: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.059906 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.059979 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.059993 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.060104 700060 task_exit.go:204] [ 684: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.060330 700060 task_signals.go:470] [ 5: 7] Notified of signal 23 D0713 05:28:06.060374 700060 task_signals.go:220] [ 5: 7] Signal 23: delivering to handler D0713 05:28:06.060978 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.062708 700060 syscalls.go:262] [ 689: 689] Allocating stack with size of 8388608 bytes D0713 05:28:06.062831 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.064301 700060 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.064347 700060 usertrap_amd64.go:106] [ 689: 689] Map a usertrap vma at 64000 D0713 05:28:06.064466 700060 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000c247e0 1 D0713 05:28:06.064507 700060 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:06.065211 700060 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.065237 700060 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000c247e0 2 D0713 05:28:06.065264 700060 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:06.066085 700060 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.066137 700060 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000c247e0 3 D0713 05:28:06.066152 700060 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:06.072602 700060 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.072635 700060 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000c247e0 4 D0713 05:28:06.072653 700060 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:06.073919 700060 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.073951 700060 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000c247e0 5 D0713 05:28:06.073965 700060 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:06.074018 700060 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.074039 700060 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000c247e0 6 D0713 05:28:06.074047 700060 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:06.074396 700060 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.074423 700060 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000c247e0 7 D0713 05:28:06.074438 700060 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:06.074649 700060 usertrap_amd64.go:212] [ 689: 690] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.074668 700060 usertrap_amd64.go:122] [ 689: 690] Allocate a new trap: 0xc000c247e0 8 D0713 05:28:06.074675 700060 usertrap_amd64.go:225] [ 689: 690] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:06.074767 700060 usertrap_amd64.go:212] [ 689: 691] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.074797 700060 usertrap_amd64.go:122] [ 689: 691] Allocate a new trap: 0xc000c247e0 9 D0713 05:28:06.074810 700060 usertrap_amd64.go:225] [ 689: 691] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:06.074897 700060 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.074919 700060 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000c247e0 10 D0713 05:28:06.074933 700060 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:06.082169 700060 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.082201 700060 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000c247e0 11 D0713 05:28:06.082212 700060 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:06.085821 700060 usertrap_amd64.go:212] [ 689: 690] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.085857 700060 usertrap_amd64.go:122] [ 689: 690] Allocate a new trap: 0xc000c247e0 12 D0713 05:28:06.085870 700060 usertrap_amd64.go:225] [ 689: 690] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:06.085911 700060 usertrap_amd64.go:212] [ 689: 690] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.085930 700060 usertrap_amd64.go:122] [ 689: 690] Allocate a new trap: 0xc000c247e0 13 D0713 05:28:06.085941 700060 usertrap_amd64.go:225] [ 689: 690] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:06.085985 700060 task_signals.go:470] [ 689: 689] Notified of signal 23 D0713 05:28:06.086088 700060 task_signals.go:220] [ 689: 689] Signal 23: delivering to handler D0713 05:28:06.092339 700060 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.092372 700060 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000c247e0 14 D0713 05:28:06.092386 700060 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:06.092461 700060 task_exit.go:204] [ 689: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.092504 700060 task_exit.go:204] [ 689: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.092531 700060 task_signals.go:204] [ 689: 690] Signal 689, PID: 690, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.092549 700060 task_exit.go:204] [ 689: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.092557 700060 task_exit.go:204] [ 689: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.092562 700060 task_exit.go:204] [ 689: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.092550 700060 task_signals.go:204] [ 689: 692] Signal 689, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.092630 700060 task_exit.go:204] [ 689: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.092651 700060 task_signals.go:204] [ 689: 693] Signal 689, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.092675 700060 task_exit.go:204] [ 689: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.092681 700060 task_exit.go:204] [ 689: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.092597 700060 task_signals.go:204] [ 689: 691] Signal 689, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.092711 700060 task_exit.go:204] [ 689: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.092745 700060 task_exit.go:204] [ 689: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.092759 700060 task_exit.go:204] [ 689: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.092770 700060 task_exit.go:204] [ 689: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.093927 700060 task_exit.go:204] [ 689: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.093971 700060 task_exit.go:204] [ 689: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.093986 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.094015 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.094025 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.094154 700060 task_exit.go:204] [ 689: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.094690 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.096203 700060 syscalls.go:262] [ 694: 694] Allocating stack with size of 8388608 bytes D0713 05:28:06.096308 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.097351 700060 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.097393 700060 usertrap_amd64.go:106] [ 694: 694] Map a usertrap vma at 67000 D0713 05:28:06.097883 700060 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc0012a5260 1 D0713 05:28:06.097929 700060 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:06.098330 700060 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.098356 700060 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc0012a5260 2 D0713 05:28:06.098367 700060 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:06.099070 700060 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.099098 700060 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc0012a5260 3 D0713 05:28:06.099111 700060 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:06.106185 700060 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.106224 700060 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc0012a5260 4 D0713 05:28:06.106240 700060 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:06.107556 700060 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.107582 700060 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc0012a5260 5 D0713 05:28:06.107594 700060 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:06.107749 700060 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.107785 700060 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc0012a5260 6 D0713 05:28:06.107799 700060 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:06.108071 700060 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.108095 700060 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc0012a5260 7 D0713 05:28:06.108104 700060 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:06.108323 700060 usertrap_amd64.go:212] [ 694: 695] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.108346 700060 usertrap_amd64.go:122] [ 694: 695] Allocate a new trap: 0xc0012a5260 8 D0713 05:28:06.108356 700060 usertrap_amd64.go:225] [ 694: 695] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:06.108717 700060 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.108742 700060 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc0012a5260 9 D0713 05:28:06.108751 700060 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:06.108809 700060 usertrap_amd64.go:212] [ 694: 695] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.108832 700060 usertrap_amd64.go:122] [ 694: 695] Allocate a new trap: 0xc0012a5260 10 D0713 05:28:06.108844 700060 usertrap_amd64.go:225] [ 694: 695] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:06.116018 700060 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.116045 700060 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc0012a5260 11 D0713 05:28:06.116056 700060 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:06.120018 700060 usertrap_amd64.go:212] [ 694: 695] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.120041 700060 usertrap_amd64.go:122] [ 694: 695] Allocate a new trap: 0xc0012a5260 12 D0713 05:28:06.120053 700060 usertrap_amd64.go:225] [ 694: 695] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:06.120137 700060 usertrap_amd64.go:212] [ 694: 695] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.120169 700060 usertrap_amd64.go:122] [ 694: 695] Allocate a new trap: 0xc0012a5260 13 D0713 05:28:06.120183 700060 usertrap_amd64.go:225] [ 694: 695] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:06.120240 700060 task_signals.go:470] [ 694: 694] Notified of signal 23 D0713 05:28:06.120355 700060 task_signals.go:220] [ 694: 694] Signal 23: delivering to handler D0713 05:28:06.126773 700060 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.126801 700060 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc0012a5260 14 D0713 05:28:06.126811 700060 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:06.126868 700060 task_exit.go:204] [ 694: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.126884 700060 task_exit.go:204] [ 694: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.126907 700060 task_signals.go:204] [ 694: 697] Signal 694, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.126928 700060 task_exit.go:204] [ 694: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.126934 700060 task_exit.go:204] [ 694: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.126938 700060 task_exit.go:204] [ 694: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.126918 700060 task_signals.go:204] [ 694: 696] Signal 694, PID: 696, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.126951 700060 task_signals.go:204] [ 694: 699] Signal 694, PID: 699, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.126970 700060 task_exit.go:204] [ 694: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.127002 700060 task_signals.go:204] [ 694: 698] Signal 694, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.127023 700060 task_signals.go:204] [ 694: 695] Signal 694, PID: 695, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.127025 700060 task_exit.go:204] [ 694: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.127039 700060 task_exit.go:204] [ 694: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.127058 700060 task_exit.go:204] [ 694: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.127100 700060 task_exit.go:204] [ 694: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.127108 700060 task_exit.go:204] [ 694: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.127126 700060 task_exit.go:204] [ 694: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.127135 700060 task_exit.go:204] [ 694: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.127142 700060 task_exit.go:204] [ 694: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.127153 700060 task_exit.go:204] [ 694: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.128331 700060 task_exit.go:204] [ 694: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.128373 700060 task_exit.go:204] [ 694: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.128391 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.128426 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.128445 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.128524 700060 task_exit.go:204] [ 694: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.129300 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.130830 700060 syscalls.go:262] [ 700: 700] Allocating stack with size of 8388608 bytes D0713 05:28:06.130940 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.132150 700060 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.132209 700060 usertrap_amd64.go:106] [ 700: 700] Map a usertrap vma at 67000 D0713 05:28:06.132521 700060 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0019cbd70 1 D0713 05:28:06.132579 700060 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:06.133457 700060 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.133483 700060 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0019cbd70 2 D0713 05:28:06.133497 700060 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:06.134111 700060 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.134133 700060 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0019cbd70 3 D0713 05:28:06.134145 700060 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:06.140534 700060 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.140565 700060 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0019cbd70 4 D0713 05:28:06.140580 700060 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:06.141779 700060 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.141820 700060 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0019cbd70 5 D0713 05:28:06.141835 700060 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:06.141950 700060 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.141977 700060 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0019cbd70 6 D0713 05:28:06.141988 700060 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:06.142429 700060 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.142446 700060 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0019cbd70 7 D0713 05:28:06.142453 700060 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:06.142593 700060 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.142623 700060 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc0019cbd70 8 D0713 05:28:06.142636 700060 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:06.142887 700060 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.142912 700060 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0019cbd70 9 D0713 05:28:06.142923 700060 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:06.143043 700060 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.143076 700060 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc0019cbd70 10 D0713 05:28:06.143090 700060 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:06.150403 700060 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.150438 700060 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0019cbd70 11 D0713 05:28:06.150450 700060 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:06.153252 700060 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.153285 700060 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc0019cbd70 12 D0713 05:28:06.153300 700060 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:06.153340 700060 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.153356 700060 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc0019cbd70 13 D0713 05:28:06.153369 700060 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:06.153403 700060 task_signals.go:470] [ 700: 700] Notified of signal 23 D0713 05:28:06.153519 700060 task_signals.go:220] [ 700: 700] Signal 23: delivering to handler I0713 05:28:06.160327 700060 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0713 05:28:06.160436 700060 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.160455 700060 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0019cbd70 14 D0713 05:28:06.160468 700060 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:06.160633 700060 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.160877 700060 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.160929 700060 task_signals.go:204] [ 700: 702] Signal 700, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.160996 700060 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.161006 700060 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.161011 700060 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.161028 700060 task_signals.go:204] [ 700: 703] Signal 700, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.161027 700060 task_signals.go:204] [ 700: 701] Signal 700, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.161065 700060 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.161081 700060 task_signals.go:204] [ 700: 704] Signal 700, PID: 704, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.161097 700060 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.161104 700060 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.161114 700060 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.161141 700060 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.161160 700060 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.161174 700060 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.162337 700060 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.162370 700060 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.162390 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.162453 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.162478 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.162566 700060 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.163134 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.164607 700060 syscalls.go:262] [ 705: 705] Allocating stack with size of 8388608 bytes D0713 05:28:06.164707 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.168324 700060 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.168425 700060 usertrap_amd64.go:106] [ 705: 705] Map a usertrap vma at 63000 D0713 05:28:06.168543 700060 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0009af200 1 D0713 05:28:06.168593 700060 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:06.169027 700060 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.169074 700060 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0009af200 2 D0713 05:28:06.169093 700060 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:06.169859 700060 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.169888 700060 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0009af200 3 D0713 05:28:06.169902 700060 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:06.179008 700060 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.179040 700060 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0009af200 4 D0713 05:28:06.179056 700060 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:06.180469 700060 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.180496 700060 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0009af200 5 D0713 05:28:06.180510 700060 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:06.180565 700060 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.180582 700060 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0009af200 6 D0713 05:28:06.180589 700060 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:06.180857 700060 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.180896 700060 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0009af200 7 D0713 05:28:06.180908 700060 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:06.181071 700060 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.181090 700060 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc0009af200 8 D0713 05:28:06.181098 700060 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:06.181261 700060 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.181277 700060 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0009af200 9 D0713 05:28:06.181285 700060 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:06.181300 700060 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.181317 700060 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc0009af200 10 D0713 05:28:06.181412 700060 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:06.189239 700060 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.189262 700060 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0009af200 11 D0713 05:28:06.189270 700060 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:06.195643 700060 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.195665 700060 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc0009af200 12 D0713 05:28:06.195675 700060 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:06.199564 700060 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.199586 700060 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc0009af200 13 D0713 05:28:06.199609 700060 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:06.199643 700060 task_signals.go:470] [ 705: 705] Notified of signal 23 D0713 05:28:06.199921 700060 task_signals.go:220] [ 705: 705] Signal 23: delivering to handler D0713 05:28:06.206341 700060 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.206367 700060 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0009af200 14 D0713 05:28:06.206378 700060 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:06.206502 700060 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.206532 700060 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.206554 700060 task_signals.go:204] [ 705: 706] Signal 705, PID: 706, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.206575 700060 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.206581 700060 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.206593 700060 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.206613 700060 task_signals.go:204] [ 705: 707] Signal 705, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.206629 700060 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.206636 700060 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.206647 700060 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.206666 700060 task_signals.go:204] [ 705: 708] Signal 705, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.206681 700060 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.206687 700060 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.206703 700060 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.206717 700060 task_signals.go:204] [ 705: 709] Signal 705, PID: 709, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.206732 700060 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.207740 700060 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.207770 700060 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.207790 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.207869 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.207888 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.208041 700060 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.208384 700060 task_signals.go:470] [ 5: 8] Notified of signal 23 D0713 05:28:06.208416 700060 task_signals.go:220] [ 5: 8] Signal 23: delivering to handler D0713 05:28:06.208897 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.210440 700060 syscalls.go:262] [ 710: 710] Allocating stack with size of 8388608 bytes D0713 05:28:06.210595 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.212222 700060 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.212257 700060 usertrap_amd64.go:106] [ 710: 710] Map a usertrap vma at 69000 D0713 05:28:06.212300 700060 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000c251a0 1 D0713 05:28:06.212325 700060 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:06.212760 700060 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.212784 700060 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000c251a0 2 D0713 05:28:06.212792 700060 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:06.213315 700060 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.213334 700060 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000c251a0 3 D0713 05:28:06.213342 700060 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:06.217351 700060 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.217374 700060 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000c251a0 4 D0713 05:28:06.217382 700060 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:06.230902 700060 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.230931 700060 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000c251a0 5 D0713 05:28:06.230944 700060 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:06.231006 700060 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.231012 700060 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000c251a0 6 D0713 05:28:06.231021 700060 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:06.231353 700060 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.231373 700060 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000c251a0 7 D0713 05:28:06.231380 700060 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:06.231538 700060 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.231582 700060 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc000c251a0 8 D0713 05:28:06.231599 700060 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:06.231738 700060 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.231756 700060 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000c251a0 9 D0713 05:28:06.231764 700060 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:06.231773 700060 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.231778 700060 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc000c251a0 10 D0713 05:28:06.231784 700060 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:06.240705 700060 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.240746 700060 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000c251a0 11 D0713 05:28:06.240761 700060 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:06.243014 700060 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.243052 700060 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc000c251a0 12 D0713 05:28:06.243067 700060 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:06.243086 700060 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.243093 700060 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc000c251a0 13 D0713 05:28:06.243101 700060 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:06.243166 700060 task_signals.go:470] [ 710: 710] Notified of signal 23 D0713 05:28:06.243228 700060 task_signals.go:220] [ 710: 710] Signal 23: delivering to handler D0713 05:28:06.250728 700060 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.250755 700060 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc000c251a0 14 D0713 05:28:06.250774 700060 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:06.250813 700060 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.250833 700060 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.250861 700060 task_signals.go:204] [ 710: 713] Signal 710, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.250851 700060 task_signals.go:204] [ 710: 711] Signal 710, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.250886 700060 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.250898 700060 task_signals.go:204] [ 710: 712] Signal 710, PID: 712, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.250910 700060 task_signals.go:204] [ 710: 714] Signal 710, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.250921 700060 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.250945 700060 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.250956 700060 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.250962 700060 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.250968 700060 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.250976 700060 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.250983 700060 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.250989 700060 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.250999 700060 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.252143 700060 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.252175 700060 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.252192 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.252226 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.252238 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.252486 700060 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.253160 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.254962 700060 syscalls.go:262] [ 715: 715] Allocating stack with size of 8388608 bytes D0713 05:28:06.255088 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.256697 700060 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.256743 700060 usertrap_amd64.go:106] [ 715: 715] Map a usertrap vma at 60000 D0713 05:28:06.256868 700060 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0009af6e0 1 D0713 05:28:06.256902 700060 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:06.257633 700060 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.257664 700060 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0009af6e0 2 D0713 05:28:06.257679 700060 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:06.258238 700060 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.258262 700060 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0009af6e0 3 D0713 05:28:06.258272 700060 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:06.263523 700060 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.263558 700060 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0009af6e0 4 D0713 05:28:06.263571 700060 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:06.264523 700060 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.264549 700060 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0009af6e0 5 D0713 05:28:06.264558 700060 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:06.265120 700060 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.265146 700060 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0009af6e0 6 D0713 05:28:06.265157 700060 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:06.265437 700060 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.265512 700060 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0009af6e0 7 D0713 05:28:06.265535 700060 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:06.265656 700060 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.265665 700060 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc0009af6e0 8 D0713 05:28:06.265673 700060 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:06.265830 700060 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.265847 700060 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc0009af6e0 9 D0713 05:28:06.265866 700060 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:06.265892 700060 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.265910 700060 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0009af6e0 10 D0713 05:28:06.265919 700060 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:06.272559 700060 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.272582 700060 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0009af6e0 11 D0713 05:28:06.272591 700060 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:06.276222 700060 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.276249 700060 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc0009af6e0 12 D0713 05:28:06.276259 700060 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:06.276300 700060 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.276309 700060 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc0009af6e0 13 D0713 05:28:06.276332 700060 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:06.276401 700060 task_signals.go:470] [ 715: 715] Notified of signal 23 D0713 05:28:06.276498 700060 task_signals.go:220] [ 715: 715] Signal 23: delivering to handler D0713 05:28:06.282129 700060 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.282160 700060 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc0009af6e0 14 D0713 05:28:06.282171 700060 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:06.282219 700060 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.282266 700060 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.282295 700060 task_signals.go:204] [ 715: 716] Signal 715, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.282329 700060 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.282340 700060 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.282347 700060 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.282364 700060 task_signals.go:204] [ 715: 717] Signal 715, PID: 717, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.282391 700060 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.282397 700060 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.282402 700060 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.282415 700060 task_signals.go:204] [ 715: 718] Signal 715, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.282431 700060 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.282436 700060 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.282440 700060 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.282451 700060 task_signals.go:204] [ 715: 719] Signal 715, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.282460 700060 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.283363 700060 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.283389 700060 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.283418 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.283449 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.283471 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.283581 700060 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.283840 700060 task_signals.go:470] [ 5: 19] Notified of signal 23 D0713 05:28:06.283882 700060 task_signals.go:220] [ 5: 19] Signal 23: delivering to handler D0713 05:28:06.284182 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.285604 700060 syscalls.go:262] [ 720: 720] Allocating stack with size of 8388608 bytes D0713 05:28:06.285703 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.286839 700060 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.286887 700060 usertrap_amd64.go:106] [ 720: 720] Map a usertrap vma at 65000 D0713 05:28:06.287002 700060 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc0012a5920 1 D0713 05:28:06.287030 700060 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:06.287300 700060 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.287329 700060 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc0012a5920 2 D0713 05:28:06.287339 700060 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:06.288124 700060 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.288151 700060 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc0012a5920 3 D0713 05:28:06.288163 700060 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:06.294658 700060 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.294690 700060 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc0012a5920 4 D0713 05:28:06.294703 700060 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:06.295745 700060 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.295770 700060 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc0012a5920 5 D0713 05:28:06.295778 700060 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:06.295819 700060 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.295824 700060 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc0012a5920 6 D0713 05:28:06.295829 700060 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:06.297073 700060 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.297106 700060 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc0012a5920 7 D0713 05:28:06.297118 700060 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:06.297268 700060 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.297289 700060 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc0012a5920 8 D0713 05:28:06.297299 700060 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:06.297443 700060 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.297586 700060 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc0012a5920 9 D0713 05:28:06.297623 700060 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:06.297664 700060 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.297673 700060 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc0012a5920 10 D0713 05:28:06.297681 700060 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:06.304146 700060 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.304171 700060 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc0012a5920 11 D0713 05:28:06.304183 700060 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:06.308058 700060 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.308089 700060 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc0012a5920 12 D0713 05:28:06.308099 700060 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:06.308156 700060 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.308177 700060 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc0012a5920 13 D0713 05:28:06.308188 700060 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:06.308233 700060 task_signals.go:470] [ 720: 720] Notified of signal 23 D0713 05:28:06.308259 700060 task_signals.go:220] [ 720: 720] Signal 23: delivering to handler D0713 05:28:06.314170 700060 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.314216 700060 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc0012a5920 14 D0713 05:28:06.314232 700060 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:06.314265 700060 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.314290 700060 task_signals.go:204] [ 720: 722] Signal 720, PID: 722, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.314311 700060 task_signals.go:204] [ 720: 725] Signal 720, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.314324 700060 task_signals.go:204] [ 720: 724] Signal 720, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.314344 700060 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.314366 700060 task_signals.go:204] [ 720: 721] Signal 720, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.314379 700060 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.314412 700060 task_signals.go:204] [ 720: 723] Signal 720, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.314426 700060 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.314432 700060 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.314443 700060 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.314450 700060 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.314456 700060 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.314465 700060 task_exit.go:204] [ 720: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.314472 700060 task_exit.go:204] [ 720: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.314478 700060 task_exit.go:204] [ 720: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.314488 700060 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.314509 700060 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.314515 700060 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.314523 700060 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.315743 700060 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.315875 700060 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.315911 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.315941 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.315966 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.316053 700060 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.316768 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.318248 700060 syscalls.go:262] [ 726: 726] Allocating stack with size of 8388608 bytes D0713 05:28:06.318354 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.323937 700060 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.323984 700060 usertrap_amd64.go:106] [ 726: 726] Map a usertrap vma at 64000 D0713 05:28:06.324069 700060 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc000c25230 1 D0713 05:28:06.324101 700060 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:06.324555 700060 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.324584 700060 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc000c25230 2 D0713 05:28:06.324595 700060 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:06.325813 700060 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.325841 700060 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc000c25230 3 D0713 05:28:06.325854 700060 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:06.331684 700060 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.331711 700060 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc000c25230 4 D0713 05:28:06.331723 700060 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:06.333034 700060 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.333069 700060 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc000c25230 5 D0713 05:28:06.333083 700060 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:06.333136 700060 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.333158 700060 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc000c25230 6 D0713 05:28:06.333167 700060 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:06.333466 700060 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.333489 700060 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc000c25230 7 D0713 05:28:06.333497 700060 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:06.333760 700060 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.333870 700060 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc000c25230 8 D0713 05:28:06.333916 700060 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:06.334102 700060 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.334130 700060 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc000c25230 9 D0713 05:28:06.334142 700060 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:06.334157 700060 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.334179 700060 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc000c25230 10 D0713 05:28:06.334189 700060 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:06.334270 700060 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:06.334291 700060 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc000c25230 11 D0713 05:28:06.334299 700060 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:06.341847 700060 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.341885 700060 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc000c25230 12 D0713 05:28:06.341901 700060 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:06.345485 700060 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.345593 700060 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc000c25230 13 D0713 05:28:06.345660 700060 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:06.345733 700060 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.345742 700060 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc000c25230 14 D0713 05:28:06.345752 700060 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:06.345771 700060 task_signals.go:470] [ 726: 726] Notified of signal 23 D0713 05:28:06.345911 700060 task_signals.go:220] [ 726: 726] Signal 23: delivering to handler D0713 05:28:06.352160 700060 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.352182 700060 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc000c25230 15 D0713 05:28:06.352195 700060 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 05:28:06.352342 700060 task_exit.go:204] [ 726: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.352385 700060 task_exit.go:204] [ 726: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.352387 700060 task_signals.go:204] [ 726: 728] Signal 726, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.352435 700060 task_exit.go:204] [ 726: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.352439 700060 task_signals.go:204] [ 726: 729] Signal 726, PID: 729, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.352450 700060 task_exit.go:204] [ 726: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.352532 700060 task_exit.go:204] [ 726: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.352558 700060 task_signals.go:204] [ 726: 730] Signal 726, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.352582 700060 task_signals.go:204] [ 726: 731] Signal 726, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.352596 700060 task_exit.go:204] [ 726: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.352649 700060 task_signals.go:204] [ 726: 727] Signal 726, PID: 727, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.352666 700060 task_exit.go:204] [ 726: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.352677 700060 task_exit.go:204] [ 726: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.352689 700060 task_exit.go:204] [ 726: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.352703 700060 task_exit.go:204] [ 726: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.352717 700060 task_exit.go:204] [ 726: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.352730 700060 task_exit.go:204] [ 726: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.352737 700060 task_exit.go:204] [ 726: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.352763 700060 task_exit.go:204] [ 726: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.352770 700060 task_exit.go:204] [ 726: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.353835 700060 task_exit.go:204] [ 726: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.353869 700060 task_exit.go:204] [ 726: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.353884 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.353927 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.353939 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.354066 700060 task_exit.go:204] [ 726: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.354145 700060 task_signals.go:470] [ 5: 8] Notified of signal 23 D0713 05:28:06.354174 700060 task_signals.go:220] [ 5: 8] Signal 23: delivering to handler D0713 05:28:06.354507 700060 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.355710 700060 syscalls.go:262] [ 732: 732] Allocating stack with size of 8388608 bytes D0713 05:28:06.355803 700060 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.359523 700060 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.359537 700060 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0713 05:28:06.359562 700060 usertrap_amd64.go:106] [ 732: 732] Map a usertrap vma at 61000 D0713 05:28:06.359647 700060 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc000c25620 1 D0713 05:28:06.359673 700060 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:06.359966 700060 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.359996 700060 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc000c25620 2 D0713 05:28:06.360004 700060 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:06.360579 700060 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.360608 700060 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc000c25620 3 D0713 05:28:06.360619 700060 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:06.367068 700060 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.367111 700060 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc000c25620 4 D0713 05:28:06.367160 700060 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:06.368862 700060 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.368999 700060 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc000c25620 5 D0713 05:28:06.369031 700060 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:06.369257 700060 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.369287 700060 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc000c25620 6 D0713 05:28:06.369298 700060 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:06.369755 700060 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.369780 700060 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc000c25620 7 D0713 05:28:06.369788 700060 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:06.369973 700060 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.370000 700060 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc000c25620 8 D0713 05:28:06.370013 700060 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:06.370291 700060 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.370319 700060 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc000c25620 9 D0713 05:28:06.370330 700060 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:06.370353 700060 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.370370 700060 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc000c25620 10 D0713 05:28:06.370381 700060 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:06.371021 700060 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.371050 700060 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc000c25620 11 D0713 05:28:06.371064 700060 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:06.371204 700060 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.371229 700060 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc000c25620 12 D0713 05:28:06.371237 700060 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:06.371276 700060 task_signals.go:470] [ 732: 732] Notified of signal 23 D0713 05:28:06.371292 700060 task_signals.go:179] [ 732: 732] Restarting syscall 202: interrupted by signal 23 D0713 05:28:06.371301 700060 task_signals.go:220] [ 732: 732] Signal 23: delivering to handler D0713 05:28:06.377365 700060 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.377400 700060 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc000c25620 13 D0713 05:28:06.377414 700060 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:06.384054 700060 task_signals.go:470] [ 732: 732] Notified of signal 23 D0713 05:28:06.384346 700060 task_signals.go:220] [ 732: 732] Signal 23: delivering to handler I0713 05:28:06.391232 700060 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0713 05:28:06.391378 700060 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.391403 700060 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc000c25620 14 D0713 05:28:06.391416 700060 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:06.391497 700060 task_exit.go:204] [ 732: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.391516 700060 task_exit.go:204] [ 732: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.391543 700060 task_signals.go:204] [ 732: 735] Signal 732, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.391535 700060 task_signals.go:204] [ 732: 734] Signal 732, PID: 734, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.391558 700060 task_exit.go:204] [ 732: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.391567 700060 task_exit.go:204] [ 732: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.391589 700060 task_exit.go:204] [ 732: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.391597 700060 task_exit.go:204] [ 732: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.391624 700060 task_signals.go:204] [ 732: 736] Signal 732, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.391664 700060 task_exit.go:204] [ 732: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.391662 700060 task_signals.go:204] [ 732: 733] Signal 732, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.391673 700060 task_exit.go:204] [ 732: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.391689 700060 task_exit.go:204] [ 732: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.391716 700060 task_exit.go:204] [ 732: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.391724 700060 task_exit.go:204] [ 732: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.391735 700060 task_exit.go:204] [ 732: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.393023 700060 task_exit.go:204] [ 732: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.393127 700060 task_exit.go:204] [ 732: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.393199 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.393322 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.393405 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.393535 700060 task_exit.go:204] [ 732: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.393904 700060 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.395231 700060 syscalls.go:262] [ 737: 737] Allocating stack with size of 8388608 bytes D0713 05:28:06.395322 700060 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.396578 700060 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.396664 700060 usertrap_amd64.go:106] [ 737: 737] Map a usertrap vma at 66000 D0713 05:28:06.396728 700060 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0009afe60 1 D0713 05:28:06.396770 700060 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:06.397374 700060 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.397415 700060 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0009afe60 2 D0713 05:28:06.397467 700060 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:06.398147 700060 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.398211 700060 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0009afe60 3 D0713 05:28:06.398270 700060 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:06.404669 700060 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.404706 700060 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0009afe60 4 D0713 05:28:06.404720 700060 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:06.406665 700060 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.406769 700060 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0009afe60 5 D0713 05:28:06.406914 700060 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:06.406991 700060 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.407031 700060 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0009afe60 6 D0713 05:28:06.407069 700060 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:06.412456 700060 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.412489 700060 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0009afe60 7 D0713 05:28:06.412501 700060 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:06.412620 700060 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.412653 700060 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc0009afe60 8 D0713 05:28:06.412666 700060 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:06.414085 700060 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.414116 700060 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc0009afe60 9 D0713 05:28:06.414126 700060 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:06.414349 700060 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.414376 700060 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0009afe60 10 D0713 05:28:06.414393 700060 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:06.423176 700060 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.423214 700060 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0009afe60 11 D0713 05:28:06.423229 700060 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:06.427136 700060 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.427170 700060 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc0009afe60 12 D0713 05:28:06.427186 700060 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:06.427317 700060 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.427339 700060 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc0009afe60 13 D0713 05:28:06.427360 700060 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:06.427520 700060 task_signals.go:470] [ 737: 737] Notified of signal 23 D0713 05:28:06.427599 700060 task_signals.go:220] [ 737: 737] Signal 23: delivering to handler D0713 05:28:06.437327 700060 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.437371 700060 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0009afe60 14 D0713 05:28:06.437382 700060 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:06.437451 700060 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.437489 700060 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.437521 700060 task_signals.go:204] [ 737: 740] Signal 737, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.437531 700060 task_signals.go:204] [ 737: 741] Signal 737, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.437551 700060 task_signals.go:204] [ 737: 739] Signal 737, PID: 739, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.437564 700060 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.437597 700060 task_signals.go:204] [ 737: 738] Signal 737, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.437610 700060 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.437616 700060 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.437629 700060 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.437636 700060 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.437640 700060 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.437649 700060 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.437655 700060 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.437660 700060 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.437670 700060 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.438767 700060 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.438802 700060 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.438818 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.438882 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.438906 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.439098 700060 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.439926 700060 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.441459 700060 syscalls.go:262] [ 742: 742] Allocating stack with size of 8388608 bytes D0713 05:28:06.441586 700060 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.442500 700060 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.442535 700060 usertrap_amd64.go:106] [ 742: 742] Map a usertrap vma at 6a000 D0713 05:28:06.442623 700060 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc001319110 1 D0713 05:28:06.442646 700060 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:06.442982 700060 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.442999 700060 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc001319110 2 D0713 05:28:06.443012 700060 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:06.443636 700060 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.443658 700060 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc001319110 3 D0713 05:28:06.443666 700060 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:06.449673 700060 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.449707 700060 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc001319110 4 D0713 05:28:06.449722 700060 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:06.451312 700060 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.451342 700060 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc001319110 5 D0713 05:28:06.451355 700060 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:06.451407 700060 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.451416 700060 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc001319110 6 D0713 05:28:06.451425 700060 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:06.452076 700060 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.452137 700060 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc001319110 7 D0713 05:28:06.452155 700060 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:06.452823 700060 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.452896 700060 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc001319110 8 D0713 05:28:06.452914 700060 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:06.453254 700060 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.453286 700060 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc001319110 9 D0713 05:28:06.453298 700060 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:06.453313 700060 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.453320 700060 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc001319110 10 D0713 05:28:06.453452 700060 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:06.454200 700060 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.454228 700060 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc001319110 11 D0713 05:28:06.454240 700060 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:06.454364 700060 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.454414 700060 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc001319110 12 D0713 05:28:06.454430 700060 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:06.454479 700060 task_signals.go:470] [ 742: 742] Notified of signal 23 D0713 05:28:06.454572 700060 task_signals.go:220] [ 742: 742] Signal 23: delivering to handler D0713 05:28:06.454726 700060 task_signals.go:470] [ 742: 742] Notified of signal 23 D0713 05:28:06.454829 700060 task_signals.go:220] [ 742: 742] Signal 23: delivering to handler D0713 05:28:06.461686 700060 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.461726 700060 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc001319110 13 D0713 05:28:06.461739 700060 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:06.466930 700060 task_signals.go:470] [ 742: 742] Notified of signal 23 D0713 05:28:06.467014 700060 task_signals.go:220] [ 742: 742] Signal 23: delivering to handler I0713 05:28:06.474522 700060 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0713 05:28:06.474682 700060 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.474714 700060 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc001319110 14 D0713 05:28:06.474728 700060 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:06.474795 700060 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.474827 700060 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.474840 700060 task_signals.go:204] [ 742: 743] Signal 742, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.474872 700060 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.474870 700060 task_signals.go:204] [ 742: 744] Signal 742, PID: 744, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.474882 700060 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.474902 700060 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.474857 700060 task_signals.go:204] [ 742: 745] Signal 742, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.474922 700060 task_signals.go:204] [ 742: 746] Signal 742, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.474934 700060 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.474951 700060 task_signals.go:204] [ 742: 747] Signal 742, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.474964 700060 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.474978 700060 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.474990 700060 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.475006 700060 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.475012 700060 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.475022 700060 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.475044 700060 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.475050 700060 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.475059 700060 task_exit.go:204] [ 742: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.476138 700060 task_exit.go:204] [ 742: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.476165 700060 task_exit.go:204] [ 742: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.476184 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.476209 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.476217 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.476351 700060 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.477447 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.478810 700060 syscalls.go:262] [ 748: 748] Allocating stack with size of 8388608 bytes D0713 05:28:06.478998 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.480000 700060 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.480031 700060 usertrap_amd64.go:106] [ 748: 748] Map a usertrap vma at 68000 D0713 05:28:06.480193 700060 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0009459e0 1 D0713 05:28:06.480237 700060 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:06.480685 700060 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.480712 700060 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0009459e0 2 D0713 05:28:06.480724 700060 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:06.481240 700060 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.481260 700060 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0009459e0 3 D0713 05:28:06.481266 700060 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:06.486654 700060 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.486682 700060 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0009459e0 4 D0713 05:28:06.486691 700060 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:06.487708 700060 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.487736 700060 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0009459e0 5 D0713 05:28:06.487745 700060 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:06.487809 700060 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.487834 700060 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0009459e0 6 D0713 05:28:06.487848 700060 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:06.488195 700060 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.488222 700060 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0009459e0 7 D0713 05:28:06.488230 700060 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:06.488377 700060 usertrap_amd64.go:212] [ 748: 749] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.488402 700060 usertrap_amd64.go:122] [ 748: 749] Allocate a new trap: 0xc0009459e0 8 D0713 05:28:06.488414 700060 usertrap_amd64.go:225] [ 748: 749] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:06.488585 700060 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.488613 700060 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0009459e0 9 D0713 05:28:06.488649 700060 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:06.488661 700060 usertrap_amd64.go:212] [ 748: 749] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.488667 700060 usertrap_amd64.go:122] [ 748: 749] Allocate a new trap: 0xc0009459e0 10 D0713 05:28:06.488677 700060 usertrap_amd64.go:225] [ 748: 749] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:06.496190 700060 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.496222 700060 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0009459e0 11 D0713 05:28:06.496235 700060 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:06.500069 700060 usertrap_amd64.go:212] [ 748: 749] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.500129 700060 usertrap_amd64.go:122] [ 748: 749] Allocate a new trap: 0xc0009459e0 12 D0713 05:28:06.500150 700060 usertrap_amd64.go:225] [ 748: 749] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:06.500233 700060 usertrap_amd64.go:212] [ 748: 749] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.500256 700060 usertrap_amd64.go:122] [ 748: 749] Allocate a new trap: 0xc0009459e0 13 D0713 05:28:06.500268 700060 usertrap_amd64.go:225] [ 748: 749] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:06.500389 700060 task_signals.go:470] [ 748: 748] Notified of signal 23 D0713 05:28:06.500551 700060 task_signals.go:220] [ 748: 748] Signal 23: delivering to handler D0713 05:28:06.506283 700060 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.506332 700060 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc0009459e0 14 D0713 05:28:06.506348 700060 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:06.506407 700060 task_exit.go:204] [ 748: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.506427 700060 task_exit.go:204] [ 748: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.506450 700060 task_signals.go:204] [ 748: 751] Signal 748, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.506476 700060 task_exit.go:204] [ 748: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.506444 700060 task_signals.go:204] [ 748: 749] Signal 748, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.506484 700060 task_exit.go:204] [ 748: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.506490 700060 task_exit.go:204] [ 748: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.506478 700060 task_signals.go:204] [ 748: 752] Signal 748, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.506467 700060 task_signals.go:204] [ 748: 750] Signal 748, PID: 750, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.506503 700060 task_exit.go:204] [ 748: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.506517 700060 task_exit.go:204] [ 748: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.506523 700060 task_exit.go:204] [ 748: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.506537 700060 task_exit.go:204] [ 748: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.506542 700060 task_exit.go:204] [ 748: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.506546 700060 task_exit.go:204] [ 748: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.506553 700060 task_exit.go:204] [ 748: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.507617 700060 task_exit.go:204] [ 748: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.507647 700060 task_exit.go:204] [ 748: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.507659 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.507678 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.507684 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.507839 700060 task_exit.go:204] [ 748: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.508395 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.509961 700060 syscalls.go:262] [ 753: 753] Allocating stack with size of 8388608 bytes D0713 05:28:06.510097 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.511165 700060 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.511259 700060 usertrap_amd64.go:106] [ 753: 753] Map a usertrap vma at 65000 D0713 05:28:06.511385 700060 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc001319200 1 D0713 05:28:06.511442 700060 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:06.514185 700060 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.514220 700060 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc001319200 2 D0713 05:28:06.514235 700060 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:06.514933 700060 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.514975 700060 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc001319200 3 D0713 05:28:06.514988 700060 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:06.521019 700060 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.521060 700060 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc001319200 4 D0713 05:28:06.521079 700060 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:06.522308 700060 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.522343 700060 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc001319200 5 D0713 05:28:06.522359 700060 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:06.524016 700060 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.524059 700060 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc001319200 6 D0713 05:28:06.524075 700060 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:06.524717 700060 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.524768 700060 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc001319200 7 D0713 05:28:06.524799 700060 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:06.525114 700060 usertrap_amd64.go:212] [ 753: 754] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.525149 700060 usertrap_amd64.go:122] [ 753: 754] Allocate a new trap: 0xc001319200 8 D0713 05:28:06.525163 700060 usertrap_amd64.go:225] [ 753: 754] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:06.525560 700060 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.525601 700060 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc001319200 9 D0713 05:28:06.525618 700060 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:06.525686 700060 usertrap_amd64.go:212] [ 753: 754] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.525704 700060 usertrap_amd64.go:122] [ 753: 754] Allocate a new trap: 0xc001319200 10 D0713 05:28:06.525717 700060 usertrap_amd64.go:225] [ 753: 754] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:06.534632 700060 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.534676 700060 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc001319200 11 D0713 05:28:06.534692 700060 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:06.537318 700060 usertrap_amd64.go:212] [ 753: 754] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.537354 700060 usertrap_amd64.go:122] [ 753: 754] Allocate a new trap: 0xc001319200 12 D0713 05:28:06.537371 700060 usertrap_amd64.go:225] [ 753: 754] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:06.537426 700060 usertrap_amd64.go:212] [ 753: 754] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.537437 700060 usertrap_amd64.go:122] [ 753: 754] Allocate a new trap: 0xc001319200 13 D0713 05:28:06.537445 700060 usertrap_amd64.go:225] [ 753: 754] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:06.537466 700060 task_signals.go:470] [ 753: 753] Notified of signal 23 D0713 05:28:06.537619 700060 task_signals.go:220] [ 753: 753] Signal 23: delivering to handler I0713 05:28:06.545327 700060 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0713 05:28:06.545419 700060 usertrap_amd64.go:212] [ 753: 753] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.545436 700060 usertrap_amd64.go:122] [ 753: 753] Allocate a new trap: 0xc001319200 14 D0713 05:28:06.545450 700060 usertrap_amd64.go:225] [ 753: 753] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:06.545510 700060 task_exit.go:204] [ 753: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.545542 700060 task_exit.go:204] [ 753: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.545563 700060 task_signals.go:204] [ 753: 755] Signal 753, PID: 755, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.545579 700060 task_signals.go:204] [ 753: 754] Signal 753, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.545563 700060 task_signals.go:204] [ 753: 756] Signal 753, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.545573 700060 task_signals.go:204] [ 753: 757] Signal 753, PID: 757, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.545587 700060 task_exit.go:204] [ 753: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.545604 700060 task_exit.go:204] [ 753: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.545611 700060 task_exit.go:204] [ 753: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.545624 700060 task_exit.go:204] [ 753: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.545631 700060 task_exit.go:204] [ 753: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.545636 700060 task_exit.go:204] [ 753: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.545646 700060 task_exit.go:204] [ 753: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.545654 700060 task_exit.go:204] [ 753: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.545659 700060 task_exit.go:204] [ 753: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.545671 700060 task_exit.go:204] [ 753: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.546769 700060 task_exit.go:204] [ 753: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.546795 700060 task_exit.go:204] [ 753: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.546818 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.546846 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.546857 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.546955 700060 task_exit.go:204] [ 753: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.547693 700060 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.549541 700060 syscalls.go:262] [ 758: 758] Allocating stack with size of 8388608 bytes D0713 05:28:06.549644 700060 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.551009 700060 usertrap_amd64.go:212] [ 758: 758] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.551034 700060 usertrap_amd64.go:106] [ 758: 758] Map a usertrap vma at 65000 D0713 05:28:06.551084 700060 usertrap_amd64.go:122] [ 758: 758] Allocate a new trap: 0xc000da2420 1 D0713 05:28:06.551100 700060 usertrap_amd64.go:225] [ 758: 758] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:06.551395 700060 usertrap_amd64.go:212] [ 758: 758] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.551425 700060 usertrap_amd64.go:122] [ 758: 758] Allocate a new trap: 0xc000da2420 2 D0713 05:28:06.551436 700060 usertrap_amd64.go:225] [ 758: 758] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:06.552003 700060 usertrap_amd64.go:212] [ 758: 758] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.552039 700060 usertrap_amd64.go:122] [ 758: 758] Allocate a new trap: 0xc000da2420 3 D0713 05:28:06.552052 700060 usertrap_amd64.go:225] [ 758: 758] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:06.559945 700060 usertrap_amd64.go:212] [ 758: 758] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.559988 700060 usertrap_amd64.go:122] [ 758: 758] Allocate a new trap: 0xc000da2420 4 D0713 05:28:06.560002 700060 usertrap_amd64.go:225] [ 758: 758] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:06.561303 700060 usertrap_amd64.go:212] [ 758: 758] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.561348 700060 usertrap_amd64.go:122] [ 758: 758] Allocate a new trap: 0xc000da2420 5 D0713 05:28:06.561363 700060 usertrap_amd64.go:225] [ 758: 758] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:06.561575 700060 usertrap_amd64.go:212] [ 758: 758] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.561623 700060 usertrap_amd64.go:122] [ 758: 758] Allocate a new trap: 0xc000da2420 6 D0713 05:28:06.561639 700060 usertrap_amd64.go:225] [ 758: 758] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:06.562085 700060 usertrap_amd64.go:212] [ 758: 758] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.562118 700060 usertrap_amd64.go:122] [ 758: 758] Allocate a new trap: 0xc000da2420 7 D0713 05:28:06.562133 700060 usertrap_amd64.go:225] [ 758: 758] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:06.562426 700060 usertrap_amd64.go:212] [ 758: 759] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.562459 700060 usertrap_amd64.go:122] [ 758: 759] Allocate a new trap: 0xc000da2420 8 D0713 05:28:06.562471 700060 usertrap_amd64.go:225] [ 758: 759] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:06.562691 700060 usertrap_amd64.go:212] [ 758: 759] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.562724 700060 usertrap_amd64.go:122] [ 758: 759] Allocate a new trap: 0xc000da2420 9 D0713 05:28:06.562762 700060 usertrap_amd64.go:225] [ 758: 759] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:06.562887 700060 usertrap_amd64.go:212] [ 758: 758] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.562908 700060 usertrap_amd64.go:122] [ 758: 758] Allocate a new trap: 0xc000da2420 10 D0713 05:28:06.562917 700060 usertrap_amd64.go:225] [ 758: 758] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:06.573069 700060 usertrap_amd64.go:212] [ 758: 758] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.573121 700060 usertrap_amd64.go:122] [ 758: 758] Allocate a new trap: 0xc000da2420 11 D0713 05:28:06.573138 700060 usertrap_amd64.go:225] [ 758: 758] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:06.573269 700060 usertrap_amd64.go:212] [ 758: 759] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.573301 700060 usertrap_amd64.go:122] [ 758: 759] Allocate a new trap: 0xc000da2420 12 D0713 05:28:06.573315 700060 usertrap_amd64.go:225] [ 758: 759] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:06.573456 700060 usertrap_amd64.go:212] [ 758: 759] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.573491 700060 usertrap_amd64.go:122] [ 758: 759] Allocate a new trap: 0xc000da2420 13 D0713 05:28:06.573504 700060 usertrap_amd64.go:225] [ 758: 759] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:06.573529 700060 task_signals.go:470] [ 758: 758] Notified of signal 23 D0713 05:28:06.573570 700060 task_signals.go:220] [ 758: 758] Signal 23: delivering to handler D0713 05:28:06.585270 700060 task_signals.go:470] [ 758: 758] Notified of signal 23 D0713 05:28:06.587541 700060 task_signals.go:220] [ 758: 758] Signal 23: delivering to handler I0713 05:28:06.588180 700060 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0713 05:28:06.588300 700060 usertrap_amd64.go:212] [ 758: 758] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.588319 700060 usertrap_amd64.go:122] [ 758: 758] Allocate a new trap: 0xc000da2420 14 D0713 05:28:06.588333 700060 usertrap_amd64.go:225] [ 758: 758] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:06.588403 700060 task_exit.go:204] [ 758: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.588446 700060 task_exit.go:204] [ 758: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.588478 700060 task_signals.go:204] [ 758: 761] Signal 758, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.588476 700060 task_signals.go:204] [ 758: 759] Signal 758, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.588494 700060 task_exit.go:204] [ 758: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.588505 700060 task_exit.go:204] [ 758: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.588528 700060 task_exit.go:204] [ 758: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.588547 700060 task_exit.go:204] [ 758: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.588473 700060 task_signals.go:204] [ 758: 760] Signal 758, PID: 760, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.588566 700060 task_exit.go:204] [ 758: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.588635 700060 task_exit.go:204] [ 758: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.588647 700060 task_exit.go:204] [ 758: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.589920 700060 task_exit.go:204] [ 758: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.589942 700060 task_exit.go:204] [ 758: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.589956 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.593188 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.593229 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.593292 700060 task_exit.go:204] [ 758: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.593839 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.595492 700060 syscalls.go:262] [ 762: 762] Allocating stack with size of 8388608 bytes D0713 05:28:06.595674 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.598016 700060 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.598059 700060 usertrap_amd64.go:106] [ 762: 762] Map a usertrap vma at 64000 D0713 05:28:06.598209 700060 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00161e2a0 1 D0713 05:28:06.598254 700060 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:06.598702 700060 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.598752 700060 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00161e2a0 2 D0713 05:28:06.598767 700060 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:06.600551 700060 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.600578 700060 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00161e2a0 3 D0713 05:28:06.600587 700060 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:06.607670 700060 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.607712 700060 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00161e2a0 4 D0713 05:28:06.607726 700060 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:06.609177 700060 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.609209 700060 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00161e2a0 5 D0713 05:28:06.609221 700060 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:06.609286 700060 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.609304 700060 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00161e2a0 6 D0713 05:28:06.609313 700060 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:06.609663 700060 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.609690 700060 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00161e2a0 7 D0713 05:28:06.609699 700060 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:06.609972 700060 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.609997 700060 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc00161e2a0 8 D0713 05:28:06.610004 700060 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:06.610235 700060 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.610261 700060 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc00161e2a0 9 D0713 05:28:06.610272 700060 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:06.610376 700060 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.610400 700060 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00161e2a0 10 D0713 05:28:06.610431 700060 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:06.610903 700060 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.610975 700060 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc00161e2a0 11 D0713 05:28:06.611002 700060 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:06.611236 700060 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.611264 700060 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc00161e2a0 12 D0713 05:28:06.611273 700060 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:06.611313 700060 task_signals.go:470] [ 762: 762] Notified of signal 23 D0713 05:28:06.611395 700060 task_signals.go:220] [ 762: 762] Signal 23: delivering to handler D0713 05:28:06.619232 700060 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.619266 700060 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00161e2a0 13 D0713 05:28:06.619278 700060 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:06.622222 700060 task_signals.go:470] [ 762: 762] Notified of signal 23 D0713 05:28:06.622294 700060 task_signals.go:220] [ 762: 762] Signal 23: delivering to handler D0713 05:28:06.631609 700060 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.631656 700060 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00161e2a0 14 D0713 05:28:06.631672 700060 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:06.631753 700060 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.631783 700060 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.631803 700060 task_signals.go:204] [ 762: 763] Signal 762, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.631835 700060 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.631855 700060 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.631875 700060 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.631811 700060 task_signals.go:204] [ 762: 764] Signal 762, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.631893 700060 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.631808 700060 task_signals.go:204] [ 762: 766] Signal 762, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.631903 700060 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.631919 700060 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.631816 700060 task_signals.go:204] [ 762: 765] Signal 762, PID: 765, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.631953 700060 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.631978 700060 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.631984 700060 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.632006 700060 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.633132 700060 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.633168 700060 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.633193 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.633232 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.633270 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.634119 700060 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.634838 700060 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.636585 700060 syscalls.go:262] [ 767: 767] Allocating stack with size of 8388608 bytes D0713 05:28:06.636725 700060 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.637621 700060 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.637656 700060 usertrap_amd64.go:106] [ 767: 767] Map a usertrap vma at 62000 D0713 05:28:06.637910 700060 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0009601e0 1 D0713 05:28:06.637943 700060 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:06.638326 700060 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.638349 700060 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0009601e0 2 D0713 05:28:06.638361 700060 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:06.638932 700060 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.638961 700060 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0009601e0 3 D0713 05:28:06.638969 700060 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:06.647102 700060 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.647149 700060 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0009601e0 4 D0713 05:28:06.647164 700060 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:06.648387 700060 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.648421 700060 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0009601e0 5 D0713 05:28:06.648432 700060 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:06.648484 700060 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.648494 700060 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0009601e0 6 D0713 05:28:06.648501 700060 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:06.648880 700060 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.648906 700060 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0009601e0 7 D0713 05:28:06.648915 700060 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:06.649151 700060 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.649183 700060 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0009601e0 8 D0713 05:28:06.649196 700060 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:06.649408 700060 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.649433 700060 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0009601e0 9 D0713 05:28:06.649441 700060 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:06.649593 700060 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.649626 700060 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0009601e0 10 D0713 05:28:06.649718 700060 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:06.649836 700060 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.649858 700060 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0009601e0 11 D0713 05:28:06.649865 700060 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:06.649905 700060 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.649932 700060 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0009601e0 12 D0713 05:28:06.649940 700060 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:06.649972 700060 task_signals.go:470] [ 767: 770] Notified of signal 23 D0713 05:28:06.650007 700060 task_signals.go:179] [ 767: 770] Restarting syscall 202: interrupted by signal 23 D0713 05:28:06.650017 700060 task_signals.go:220] [ 767: 770] Signal 23: delivering to handler D0713 05:28:06.658626 700060 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.658668 700060 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0009601e0 13 D0713 05:28:06.658684 700060 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:06.661078 700060 task_signals.go:470] [ 767: 767] Notified of signal 23 D0713 05:28:06.661168 700060 task_signals.go:220] [ 767: 767] Signal 23: delivering to handler D0713 05:28:06.669943 700060 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.669974 700060 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0009601e0 14 D0713 05:28:06.669986 700060 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:06.670032 700060 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.670060 700060 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.670084 700060 task_signals.go:204] [ 767: 768] Signal 767, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.670116 700060 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.670125 700060 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.670114 700060 task_signals.go:204] [ 767: 770] Signal 767, PID: 770, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.670152 700060 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.670090 700060 task_signals.go:204] [ 767: 771] Signal 767, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.670172 700060 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.670183 700060 task_signals.go:204] [ 767: 769] Signal 767, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.670197 700060 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.670203 700060 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.670222 700060 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.670235 700060 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.670239 700060 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.670250 700060 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.671317 700060 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.671358 700060 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.671372 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.671412 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.671427 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.671502 700060 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.672250 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.673687 700060 syscalls.go:262] [ 772: 772] Allocating stack with size of 8388608 bytes D0713 05:28:06.673956 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.674850 700060 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.674881 700060 usertrap_amd64.go:106] [ 772: 772] Map a usertrap vma at 62000 D0713 05:28:06.675324 700060 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc000868f60 1 D0713 05:28:06.675382 700060 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:06.675571 700060 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.675595 700060 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc000868f60 2 D0713 05:28:06.675604 700060 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:06.675982 700060 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.675998 700060 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc000868f60 3 D0713 05:28:06.676004 700060 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:06.682872 700060 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.682911 700060 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc000868f60 4 D0713 05:28:06.682925 700060 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:06.684093 700060 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.684122 700060 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc000868f60 5 D0713 05:28:06.684130 700060 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:06.684184 700060 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.684209 700060 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc000868f60 6 D0713 05:28:06.684217 700060 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:06.684608 700060 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.684697 700060 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc000868f60 7 D0713 05:28:06.684721 700060 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:06.684991 700060 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.685024 700060 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc000868f60 8 D0713 05:28:06.685031 700060 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:06.685224 700060 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.685263 700060 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc000868f60 9 D0713 05:28:06.685281 700060 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:06.685581 700060 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.685642 700060 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc000868f60 10 D0713 05:28:06.685687 700060 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:06.693384 700060 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.693422 700060 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc000868f60 11 D0713 05:28:06.693433 700060 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:06.697052 700060 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.697087 700060 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc000868f60 12 D0713 05:28:06.697103 700060 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:06.697124 700060 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.697161 700060 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc000868f60 13 D0713 05:28:06.697170 700060 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:06.697234 700060 task_signals.go:470] [ 772: 772] Notified of signal 23 D0713 05:28:06.697328 700060 task_signals.go:220] [ 772: 772] Signal 23: delivering to handler D0713 05:28:06.703832 700060 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.703862 700060 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc000868f60 14 D0713 05:28:06.703871 700060 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:06.703941 700060 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.703956 700060 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.703974 700060 task_signals.go:204] [ 772: 775] Signal 772, PID: 775, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.703998 700060 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.704002 700060 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.704006 700060 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.703986 700060 task_signals.go:204] [ 772: 774] Signal 772, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.704022 700060 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.704030 700060 task_signals.go:204] [ 772: 776] Signal 772, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.704042 700060 task_signals.go:204] [ 772: 773] Signal 772, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.704050 700060 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.704054 700060 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.704060 700060 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.704065 700060 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.704069 700060 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.704076 700060 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.705391 700060 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.705421 700060 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.705433 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.705465 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.705495 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.705672 700060 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.706384 700060 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.707878 700060 syscalls.go:262] [ 777: 777] Allocating stack with size of 8388608 bytes D0713 05:28:06.707962 700060 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.709722 700060 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.709759 700060 usertrap_amd64.go:106] [ 777: 777] Map a usertrap vma at 67000 D0713 05:28:06.709861 700060 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc000960750 1 D0713 05:28:06.709895 700060 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:06.710327 700060 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.710391 700060 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc000960750 2 D0713 05:28:06.710431 700060 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:06.711001 700060 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.711028 700060 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc000960750 3 D0713 05:28:06.711039 700060 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:06.718272 700060 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.718298 700060 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc000960750 4 D0713 05:28:06.718310 700060 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:06.719613 700060 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.719638 700060 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc000960750 5 D0713 05:28:06.719648 700060 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:06.719708 700060 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.719724 700060 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc000960750 6 D0713 05:28:06.719735 700060 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:06.719981 700060 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.719996 700060 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc000960750 7 D0713 05:28:06.720005 700060 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:06.720176 700060 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.720196 700060 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc000960750 8 D0713 05:28:06.720208 700060 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:06.720479 700060 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.720499 700060 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc000960750 9 D0713 05:28:06.720509 700060 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:06.720575 700060 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.720588 700060 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc000960750 10 D0713 05:28:06.720596 700060 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:06.720760 700060 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:06.720779 700060 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc000960750 11 D0713 05:28:06.720788 700060 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b6e0 trap addr 67370 ([184 24 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:06.728658 700060 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.728833 700060 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc000960750 12 D0713 05:28:06.728866 700060 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:06.731443 700060 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.731464 700060 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc000960750 13 D0713 05:28:06.731475 700060 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:06.731491 700060 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.731497 700060 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc000960750 14 D0713 05:28:06.731530 700060 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:06.731564 700060 task_signals.go:470] [ 777: 777] Notified of signal 23 D0713 05:28:06.731700 700060 task_signals.go:220] [ 777: 777] Signal 23: delivering to handler D0713 05:28:06.738879 700060 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.738949 700060 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc000960750 15 D0713 05:28:06.738973 700060 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 05:28:06.738992 700060 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.739006 700060 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.739030 700060 task_signals.go:204] [ 777: 779] Signal 777, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.739046 700060 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.739050 700060 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.739054 700060 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.739045 700060 task_signals.go:204] [ 777: 780] Signal 777, PID: 780, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.739067 700060 task_signals.go:204] [ 777: 781] Signal 777, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.739070 700060 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.739091 700060 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.739099 700060 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.739114 700060 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.739135 700060 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.739141 700060 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.739203 700060 task_signals.go:204] [ 777: 778] Signal 777, PID: 778, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.739227 700060 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.740249 700060 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.740277 700060 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.740292 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.740322 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.740332 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.740596 700060 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.741228 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.742701 700060 syscalls.go:262] [ 782: 782] Allocating stack with size of 8388608 bytes D0713 05:28:06.742780 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.746127 700060 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.746161 700060 usertrap_amd64.go:106] [ 782: 782] Map a usertrap vma at 64000 D0713 05:28:06.746229 700060 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000da2a80 1 D0713 05:28:06.746247 700060 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:06.746557 700060 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.746577 700060 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000da2a80 2 D0713 05:28:06.746584 700060 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:06.747122 700060 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.747164 700060 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000da2a80 3 D0713 05:28:06.747174 700060 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:06.753107 700060 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.753173 700060 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000da2a80 4 D0713 05:28:06.753187 700060 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:06.757078 700060 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.757113 700060 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000da2a80 5 D0713 05:28:06.757125 700060 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:06.757183 700060 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.757206 700060 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000da2a80 6 D0713 05:28:06.757214 700060 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:06.757462 700060 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.757486 700060 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000da2a80 7 D0713 05:28:06.757493 700060 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:06.757671 700060 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.757691 700060 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc000da2a80 8 D0713 05:28:06.757700 700060 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:06.757833 700060 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.757849 700060 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc000da2a80 9 D0713 05:28:06.757855 700060 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:06.758041 700060 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.758064 700060 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000da2a80 10 D0713 05:28:06.758074 700060 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:06.758388 700060 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.758405 700060 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc000da2a80 11 D0713 05:28:06.758412 700060 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:06.758429 700060 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.758439 700060 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc000da2a80 12 D0713 05:28:06.758445 700060 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:06.758465 700060 task_signals.go:470] [ 782: 782] Notified of signal 23 D0713 05:28:06.758511 700060 task_signals.go:220] [ 782: 782] Signal 23: delivering to handler D0713 05:28:06.765202 700060 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.765251 700060 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000da2a80 13 D0713 05:28:06.765265 700060 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:06.769037 700060 task_signals.go:470] [ 782: 782] Notified of signal 23 D0713 05:28:06.769136 700060 task_signals.go:220] [ 782: 782] Signal 23: delivering to handler D0713 05:28:06.780249 700060 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.780298 700060 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc000da2a80 14 D0713 05:28:06.780317 700060 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:06.780400 700060 task_exit.go:204] [ 782: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.780497 700060 task_exit.go:204] [ 782: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.780546 700060 task_signals.go:204] [ 782: 783] Signal 782, PID: 783, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.780579 700060 task_exit.go:204] [ 782: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.780612 700060 task_exit.go:204] [ 782: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.780620 700060 task_exit.go:204] [ 782: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.780648 700060 task_signals.go:204] [ 782: 784] Signal 782, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.780677 700060 task_exit.go:204] [ 782: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.780692 700060 task_exit.go:204] [ 782: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.780698 700060 task_exit.go:204] [ 782: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.780726 700060 task_signals.go:204] [ 782: 785] Signal 782, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.780762 700060 task_exit.go:204] [ 782: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.780771 700060 task_exit.go:204] [ 782: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.780775 700060 task_exit.go:204] [ 782: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.780789 700060 task_signals.go:204] [ 782: 786] Signal 782, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.780797 700060 task_exit.go:204] [ 782: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.781976 700060 task_exit.go:204] [ 782: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.782005 700060 task_exit.go:204] [ 782: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.782021 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.782049 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.782058 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.782196 700060 task_exit.go:204] [ 782: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.782877 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.784144 700060 syscalls.go:262] [ 787: 787] Allocating stack with size of 8388608 bytes D0713 05:28:06.784332 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.786128 700060 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.786161 700060 usertrap_amd64.go:106] [ 787: 787] Map a usertrap vma at 68000 D0713 05:28:06.786253 700060 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000869e00 1 D0713 05:28:06.786270 700060 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:06.786583 700060 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.786595 700060 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000869e00 2 D0713 05:28:06.786604 700060 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:06.787386 700060 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.787402 700060 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000869e00 3 D0713 05:28:06.787414 700060 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:06.793487 700060 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.793524 700060 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000869e00 4 D0713 05:28:06.793538 700060 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:06.794996 700060 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.795028 700060 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000869e00 5 D0713 05:28:06.795039 700060 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:06.795089 700060 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.795097 700060 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000869e00 6 D0713 05:28:06.795104 700060 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:06.795364 700060 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.795395 700060 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000869e00 7 D0713 05:28:06.795405 700060 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:06.795586 700060 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.795612 700060 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc000869e00 8 D0713 05:28:06.795622 700060 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:06.795762 700060 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.795786 700060 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc000869e00 9 D0713 05:28:06.795837 700060 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:06.796090 700060 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.796119 700060 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000869e00 10 D0713 05:28:06.796129 700060 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:06.803999 700060 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.804119 700060 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000869e00 11 D0713 05:28:06.804151 700060 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:06.807014 700060 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.807045 700060 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc000869e00 12 D0713 05:28:06.807058 700060 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:06.807127 700060 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.807147 700060 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc000869e00 13 D0713 05:28:06.807158 700060 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:06.807198 700060 task_signals.go:470] [ 787: 787] Notified of signal 23 D0713 05:28:06.807289 700060 task_signals.go:220] [ 787: 787] Signal 23: delivering to handler D0713 05:28:06.815791 700060 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.815836 700060 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc000869e00 14 D0713 05:28:06.815850 700060 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:06.815930 700060 task_exit.go:204] [ 787: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.815952 700060 task_exit.go:204] [ 787: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.815978 700060 task_signals.go:204] [ 787: 788] Signal 787, PID: 788, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.816012 700060 task_signals.go:204] [ 787: 789] Signal 787, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.816015 700060 task_signals.go:204] [ 787: 790] Signal 787, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.816019 700060 task_exit.go:204] [ 787: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.815984 700060 task_signals.go:204] [ 787: 791] Signal 787, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.816034 700060 task_exit.go:204] [ 787: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.816046 700060 task_exit.go:204] [ 787: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.816053 700060 task_exit.go:204] [ 787: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.816066 700060 task_exit.go:204] [ 787: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.816103 700060 task_exit.go:204] [ 787: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.816116 700060 task_exit.go:204] [ 787: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.816135 700060 task_exit.go:204] [ 787: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.816146 700060 task_exit.go:204] [ 787: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.816153 700060 task_exit.go:204] [ 787: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.817277 700060 task_exit.go:204] [ 787: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.817308 700060 task_exit.go:204] [ 787: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.817332 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.817397 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.817410 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.817650 700060 task_exit.go:204] [ 787: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.818396 700060 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.820021 700060 syscalls.go:262] [ 792: 792] Allocating stack with size of 8388608 bytes D0713 05:28:06.820121 700060 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.821476 700060 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.821517 700060 usertrap_amd64.go:106] [ 792: 792] Map a usertrap vma at 67000 D0713 05:28:06.821727 700060 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc00161f080 1 D0713 05:28:06.821764 700060 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:06.822098 700060 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.822123 700060 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc00161f080 2 D0713 05:28:06.822132 700060 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:06.822687 700060 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.822707 700060 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc00161f080 3 D0713 05:28:06.822718 700060 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:06.830252 700060 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.830294 700060 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc00161f080 4 D0713 05:28:06.830310 700060 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:06.831930 700060 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.831990 700060 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc00161f080 5 D0713 05:28:06.832008 700060 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:06.832079 700060 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.832087 700060 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc00161f080 6 D0713 05:28:06.832094 700060 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:06.832401 700060 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.832424 700060 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc00161f080 7 D0713 05:28:06.832434 700060 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:06.832756 700060 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.832785 700060 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc00161f080 8 D0713 05:28:06.832798 700060 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:06.832879 700060 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.832895 700060 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc00161f080 9 D0713 05:28:06.832924 700060 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:06.832998 700060 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.833006 700060 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc00161f080 10 D0713 05:28:06.833014 700060 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:06.833278 700060 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.833318 700060 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc00161f080 11 D0713 05:28:06.833381 700060 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:06.833508 700060 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.833532 700060 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc00161f080 12 D0713 05:28:06.833542 700060 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:06.833562 700060 task_signals.go:470] [ 792: 795] Notified of signal 23 D0713 05:28:06.833597 700060 task_signals.go:179] [ 792: 795] Restarting syscall 202: interrupted by signal 23 D0713 05:28:06.833608 700060 task_signals.go:220] [ 792: 795] Signal 23: delivering to handler D0713 05:28:06.841676 700060 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.841707 700060 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc00161f080 13 D0713 05:28:06.841719 700060 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:06.844589 700060 task_signals.go:470] [ 792: 792] Notified of signal 23 D0713 05:28:06.844651 700060 task_signals.go:220] [ 792: 792] Signal 23: delivering to handler D0713 05:28:06.852376 700060 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.852414 700060 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc00161f080 14 D0713 05:28:06.852428 700060 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:06.852487 700060 task_exit.go:204] [ 792: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.852506 700060 task_exit.go:204] [ 792: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.852531 700060 task_signals.go:204] [ 792: 793] Signal 792, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.852546 700060 task_exit.go:204] [ 792: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.852554 700060 task_exit.go:204] [ 792: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.852560 700060 task_exit.go:204] [ 792: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.852575 700060 task_signals.go:204] [ 792: 794] Signal 792, PID: 794, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.852595 700060 task_exit.go:204] [ 792: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.852602 700060 task_exit.go:204] [ 792: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.852608 700060 task_exit.go:204] [ 792: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.852628 700060 task_signals.go:204] [ 792: 795] Signal 792, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.852641 700060 task_exit.go:204] [ 792: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.852648 700060 task_exit.go:204] [ 792: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.852654 700060 task_exit.go:204] [ 792: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.852666 700060 task_signals.go:204] [ 792: 796] Signal 792, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.852676 700060 task_exit.go:204] [ 792: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.853832 700060 task_exit.go:204] [ 792: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.853862 700060 task_exit.go:204] [ 792: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.853875 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.853895 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.853902 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.854007 700060 task_exit.go:204] [ 792: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.854059 700060 task_signals.go:470] [ 5: 9] Notified of signal 23 D0713 05:28:06.854093 700060 task_signals.go:220] [ 5: 9] Signal 23: delivering to handler D0713 05:28:06.854651 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.856016 700060 syscalls.go:262] [ 797: 797] Allocating stack with size of 8388608 bytes D0713 05:28:06.856117 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.856886 700060 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.856931 700060 usertrap_amd64.go:106] [ 797: 797] Map a usertrap vma at 67000 D0713 05:28:06.857418 700060 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc000961440 1 D0713 05:28:06.857451 700060 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:06.857790 700060 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.857808 700060 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc000961440 2 D0713 05:28:06.857819 700060 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:06.858225 700060 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.858241 700060 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc000961440 3 D0713 05:28:06.858247 700060 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:06.864860 700060 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.864887 700060 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc000961440 4 D0713 05:28:06.864897 700060 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:06.866200 700060 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.866223 700060 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc000961440 5 D0713 05:28:06.866231 700060 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:06.866273 700060 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.866278 700060 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc000961440 6 D0713 05:28:06.866283 700060 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:06.866454 700060 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.866483 700060 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc000961440 7 D0713 05:28:06.866494 700060 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:06.866702 700060 usertrap_amd64.go:212] [ 797: 798] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.866725 700060 usertrap_amd64.go:122] [ 797: 798] Allocate a new trap: 0xc000961440 8 D0713 05:28:06.866735 700060 usertrap_amd64.go:225] [ 797: 798] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:06.866858 700060 usertrap_amd64.go:212] [ 797: 798] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.866882 700060 usertrap_amd64.go:122] [ 797: 798] Allocate a new trap: 0xc000961440 9 D0713 05:28:06.866919 700060 usertrap_amd64.go:225] [ 797: 798] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:06.866931 700060 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.866937 700060 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc000961440 10 D0713 05:28:06.866964 700060 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:06.867328 700060 usertrap_amd64.go:212] [ 797: 798] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.867355 700060 usertrap_amd64.go:122] [ 797: 798] Allocate a new trap: 0xc000961440 11 D0713 05:28:06.867366 700060 usertrap_amd64.go:225] [ 797: 798] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:06.867418 700060 usertrap_amd64.go:212] [ 797: 798] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.867439 700060 usertrap_amd64.go:122] [ 797: 798] Allocate a new trap: 0xc000961440 12 D0713 05:28:06.867446 700060 usertrap_amd64.go:225] [ 797: 798] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:06.867483 700060 task_signals.go:470] [ 797: 797] Notified of signal 23 D0713 05:28:06.867514 700060 task_signals.go:220] [ 797: 797] Signal 23: delivering to handler D0713 05:28:06.873520 700060 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.873549 700060 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc000961440 13 D0713 05:28:06.873563 700060 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:06.877840 700060 task_signals.go:481] [ 797: 797] No task notified of signal 23 D0713 05:28:06.877893 700060 task_signals.go:220] [ 797: 797] Signal 23: delivering to handler D0713 05:28:06.883297 700060 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.883322 700060 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc000961440 14 D0713 05:28:06.883333 700060 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:06.883425 700060 task_exit.go:204] [ 797: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.883467 700060 task_signals.go:204] [ 797: 799] Signal 797, PID: 799, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.883489 700060 task_signals.go:204] [ 797: 801] Signal 797, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.883490 700060 task_signals.go:204] [ 797: 800] Signal 797, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.883507 700060 task_signals.go:204] [ 797: 798] Signal 797, PID: 798, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.883529 700060 task_signals.go:204] [ 797: 802] Signal 797, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.883544 700060 task_exit.go:204] [ 797: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.883561 700060 task_signals.go:204] [ 797: 803] Signal 797, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.883575 700060 task_exit.go:204] [ 797: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.883584 700060 task_exit.go:204] [ 797: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.883589 700060 task_exit.go:204] [ 797: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.883603 700060 task_exit.go:204] [ 797: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.883617 700060 task_exit.go:204] [ 797: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.883632 700060 task_exit.go:204] [ 797: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.883646 700060 task_exit.go:204] [ 797: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.883653 700060 task_exit.go:204] [ 797: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.883659 700060 task_exit.go:204] [ 797: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.883668 700060 task_exit.go:204] [ 797: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.883675 700060 task_exit.go:204] [ 797: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.883680 700060 task_exit.go:204] [ 797: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.883698 700060 task_exit.go:204] [ 797: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.883723 700060 task_exit.go:204] [ 797: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.883729 700060 task_exit.go:204] [ 797: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.883737 700060 task_exit.go:204] [ 797: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.884712 700060 task_exit.go:204] [ 797: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.884736 700060 task_exit.go:204] [ 797: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.884747 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.884766 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.884772 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.884914 700060 task_exit.go:204] [ 797: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.885531 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.886877 700060 syscalls.go:262] [ 804: 804] Allocating stack with size of 8388608 bytes D0713 05:28:06.886973 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.889612 700060 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.889649 700060 usertrap_amd64.go:106] [ 804: 804] Map a usertrap vma at 69000 D0713 05:28:06.889731 700060 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001e6e330 1 D0713 05:28:06.889757 700060 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:06.890358 700060 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.890383 700060 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001e6e330 2 D0713 05:28:06.890406 700060 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:06.890963 700060 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.890990 700060 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001e6e330 3 D0713 05:28:06.891004 700060 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:06.897258 700060 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.897284 700060 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001e6e330 4 D0713 05:28:06.897307 700060 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:06.898614 700060 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.898642 700060 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001e6e330 5 D0713 05:28:06.898657 700060 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:06.898695 700060 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.898703 700060 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001e6e330 6 D0713 05:28:06.898712 700060 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:06.898901 700060 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.898922 700060 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001e6e330 7 D0713 05:28:06.898934 700060 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:06.899102 700060 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.899126 700060 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc001e6e330 8 D0713 05:28:06.899138 700060 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:06.899350 700060 usertrap_amd64.go:212] [ 804: 806] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.899366 700060 usertrap_amd64.go:122] [ 804: 806] Allocate a new trap: 0xc001e6e330 9 D0713 05:28:06.899378 700060 usertrap_amd64.go:225] [ 804: 806] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:06.899559 700060 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.899585 700060 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001e6e330 10 D0713 05:28:06.899596 700060 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:06.907331 700060 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.907364 700060 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001e6e330 11 D0713 05:28:06.907376 700060 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:06.909793 700060 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.909822 700060 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc001e6e330 12 D0713 05:28:06.909834 700060 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:06.909919 700060 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.909945 700060 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc001e6e330 13 D0713 05:28:06.909956 700060 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:06.910013 700060 task_signals.go:470] [ 804: 804] Notified of signal 23 D0713 05:28:06.910075 700060 task_signals.go:220] [ 804: 804] Signal 23: delivering to handler D0713 05:28:06.916680 700060 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.916709 700060 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001e6e330 14 D0713 05:28:06.916720 700060 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:06.916775 700060 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.916792 700060 task_signals.go:204] [ 804: 805] Signal 804, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.916806 700060 task_signals.go:204] [ 804: 808] Signal 804, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.916824 700060 task_signals.go:204] [ 804: 807] Signal 804, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.916831 700060 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.916821 700060 task_signals.go:204] [ 804: 806] Signal 804, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.916840 700060 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.916845 700060 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.916849 700060 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.916857 700060 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.916861 700060 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.916864 700060 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.916870 700060 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.916874 700060 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.916877 700060 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.916890 700060 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.917790 700060 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.917812 700060 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.917823 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.917859 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.917889 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.917961 700060 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.918478 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.919709 700060 syscalls.go:262] [ 809: 809] Allocating stack with size of 8388608 bytes D0713 05:28:06.919805 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.920926 700060 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.920998 700060 usertrap_amd64.go:106] [ 809: 809] Map a usertrap vma at 69000 D0713 05:28:06.921076 700060 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000961a10 1 D0713 05:28:06.921093 700060 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:06.921322 700060 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.921339 700060 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000961a10 2 D0713 05:28:06.921348 700060 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:06.921808 700060 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.921888 700060 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000961a10 3 D0713 05:28:06.921910 700060 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:06.928115 700060 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.928168 700060 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000961a10 4 D0713 05:28:06.928183 700060 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:06.929553 700060 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.929579 700060 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000961a10 5 D0713 05:28:06.929591 700060 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:06.929657 700060 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.929683 700060 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000961a10 6 D0713 05:28:06.929695 700060 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:06.930057 700060 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.930097 700060 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000961a10 7 D0713 05:28:06.930111 700060 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:06.930288 700060 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.930311 700060 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc000961a10 8 D0713 05:28:06.930320 700060 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:06.930546 700060 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.930573 700060 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc000961a10 9 D0713 05:28:06.930584 700060 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:06.930671 700060 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.930691 700060 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000961a10 10 D0713 05:28:06.930699 700060 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:06.937479 700060 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.937515 700060 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000961a10 11 D0713 05:28:06.937526 700060 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:06.940878 700060 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.940898 700060 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc000961a10 12 D0713 05:28:06.940909 700060 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:06.940928 700060 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.941004 700060 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc000961a10 13 D0713 05:28:06.941015 700060 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:06.941055 700060 task_signals.go:470] [ 809: 809] Notified of signal 23 D0713 05:28:06.941110 700060 task_signals.go:220] [ 809: 809] Signal 23: delivering to handler D0713 05:28:06.947882 700060 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.947907 700060 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc000961a10 14 D0713 05:28:06.947917 700060 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:06.947978 700060 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.947999 700060 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.948021 700060 task_signals.go:204] [ 809: 810] Signal 809, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.948037 700060 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.948045 700060 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.948050 700060 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.948067 700060 task_signals.go:204] [ 809: 811] Signal 809, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.948087 700060 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.948094 700060 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.948100 700060 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.948114 700060 task_signals.go:204] [ 809: 812] Signal 809, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.948134 700060 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.948139 700060 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.948144 700060 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.948159 700060 task_signals.go:204] [ 809: 813] Signal 809, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.948178 700060 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.950179 700060 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.950235 700060 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.950266 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.950300 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.950311 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.950403 700060 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.950547 700060 task_signals.go:470] [ 5: 8] Notified of signal 23 D0713 05:28:06.950644 700060 task_signals.go:220] [ 5: 8] Signal 23: delivering to handler D0713 05:28:06.951012 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.952237 700060 syscalls.go:262] [ 814: 814] Allocating stack with size of 8388608 bytes D0713 05:28:06.952348 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.953795 700060 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.953829 700060 usertrap_amd64.go:106] [ 814: 814] Map a usertrap vma at 67000 D0713 05:28:06.953934 700060 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000da3230 1 D0713 05:28:06.953976 700060 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:06.954370 700060 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.954402 700060 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000da3230 2 D0713 05:28:06.954416 700060 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:06.955147 700060 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.955172 700060 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000da3230 3 D0713 05:28:06.955186 700060 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:06.962417 700060 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.962455 700060 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000da3230 4 D0713 05:28:06.962468 700060 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:06.963670 700060 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.963693 700060 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000da3230 5 D0713 05:28:06.963704 700060 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:06.963760 700060 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.963772 700060 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000da3230 6 D0713 05:28:06.963777 700060 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:06.964060 700060 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.964075 700060 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000da3230 7 D0713 05:28:06.964081 700060 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:06.964215 700060 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.964237 700060 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000da3230 8 D0713 05:28:06.964249 700060 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:06.964442 700060 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.964478 700060 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000da3230 9 D0713 05:28:06.964490 700060 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:06.964579 700060 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.964633 700060 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000da3230 10 D0713 05:28:06.964670 700060 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:06.972925 700060 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.973016 700060 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000da3230 11 D0713 05:28:06.973038 700060 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:06.975388 700060 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.975447 700060 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000da3230 12 D0713 05:28:06.975464 700060 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:06.975520 700060 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.975533 700060 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000da3230 13 D0713 05:28:06.975541 700060 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:06.975582 700060 task_signals.go:470] [ 814: 814] Notified of signal 23 D0713 05:28:06.975656 700060 task_signals.go:220] [ 814: 814] Signal 23: delivering to handler D0713 05:28:06.983636 700060 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.983673 700060 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000da3230 14 D0713 05:28:06.983685 700060 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:06.983745 700060 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.983762 700060 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.983784 700060 task_signals.go:204] [ 814: 815] Signal 814, PID: 815, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.983799 700060 task_signals.go:204] [ 814: 817] Signal 814, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.983809 700060 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.983867 700060 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.983880 700060 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.983894 700060 task_signals.go:204] [ 814: 818] Signal 814, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.983911 700060 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.983924 700060 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.983943 700060 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.983897 700060 task_signals.go:204] [ 814: 816] Signal 814, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.983959 700060 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.983976 700060 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.983983 700060 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.983992 700060 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.985388 700060 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.985412 700060 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.985428 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:06.985486 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.985511 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:06.985659 700060 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.985930 700060 task_signals.go:470] [ 5: 8] Notified of signal 23 D0713 05:28:06.985975 700060 task_signals.go:220] [ 5: 8] Signal 23: delivering to handler D0713 05:28:06.986078 700060 task_signals.go:470] [ 5: 8] Notified of signal 23 D0713 05:28:06.986119 700060 task_signals.go:220] [ 5: 8] Signal 23: delivering to handler D0713 05:28:06.987138 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.988641 700060 syscalls.go:262] [ 819: 819] Allocating stack with size of 8388608 bytes D0713 05:28:06.988829 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.989798 700060 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.989834 700060 usertrap_amd64.go:106] [ 819: 819] Map a usertrap vma at 60000 D0713 05:28:06.989987 700060 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc00161f830 1 D0713 05:28:06.990028 700060 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:06.990393 700060 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.990413 700060 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc00161f830 2 D0713 05:28:06.990421 700060 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:06.991013 700060 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.991049 700060 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc00161f830 3 D0713 05:28:06.991063 700060 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:06.997344 700060 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.997383 700060 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc00161f830 4 D0713 05:28:06.997397 700060 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:06.998655 700060 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.998686 700060 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc00161f830 5 D0713 05:28:06.998699 700060 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:06.998810 700060 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.998832 700060 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc00161f830 6 D0713 05:28:06.998840 700060 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:06.999510 700060 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.999531 700060 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc00161f830 7 D0713 05:28:06.999537 700060 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:06.999657 700060 usertrap_amd64.go:212] [ 819: 820] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.999677 700060 usertrap_amd64.go:122] [ 819: 820] Allocate a new trap: 0xc00161f830 8 D0713 05:28:06.999684 700060 usertrap_amd64.go:225] [ 819: 820] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:06.999865 700060 usertrap_amd64.go:212] [ 819: 820] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.999887 700060 usertrap_amd64.go:122] [ 819: 820] Allocate a new trap: 0xc00161f830 9 D0713 05:28:06.999894 700060 usertrap_amd64.go:225] [ 819: 820] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:06.999936 700060 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.999944 700060 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc00161f830 10 D0713 05:28:06.999953 700060 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) executing program D0713 05:28:07.008346 700060 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.008402 700060 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc00161f830 11 D0713 05:28:07.008416 700060 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:07.011121 700060 usertrap_amd64.go:212] [ 819: 820] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.011167 700060 usertrap_amd64.go:122] [ 819: 820] Allocate a new trap: 0xc00161f830 12 D0713 05:28:07.011182 700060 usertrap_amd64.go:225] [ 819: 820] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:07.011202 700060 usertrap_amd64.go:212] [ 819: 820] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.011208 700060 usertrap_amd64.go:122] [ 819: 820] Allocate a new trap: 0xc00161f830 13 D0713 05:28:07.011216 700060 usertrap_amd64.go:225] [ 819: 820] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:07.011232 700060 task_signals.go:470] [ 819: 819] Notified of signal 23 D0713 05:28:07.011304 700060 task_signals.go:220] [ 819: 819] Signal 23: delivering to handler I0713 05:28:07.019063 700060 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0713 05:28:07.019161 700060 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.019182 700060 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc00161f830 14 D0713 05:28:07.019192 700060 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:07.019247 700060 task_exit.go:204] [ 819: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.019269 700060 task_exit.go:204] [ 819: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.019293 700060 task_signals.go:204] [ 819: 822] Signal 819, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.019313 700060 task_signals.go:204] [ 819: 823] Signal 819, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.019320 700060 task_exit.go:204] [ 819: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.019293 700060 task_signals.go:204] [ 819: 821] Signal 819, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.019336 700060 task_exit.go:204] [ 819: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.019344 700060 task_exit.go:204] [ 819: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.019359 700060 task_exit.go:204] [ 819: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.019378 700060 task_exit.go:204] [ 819: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.019384 700060 task_exit.go:204] [ 819: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.019404 700060 task_exit.go:204] [ 819: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.019410 700060 task_exit.go:204] [ 819: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.019415 700060 task_exit.go:204] [ 819: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.019425 700060 task_signals.go:204] [ 819: 820] Signal 819, PID: 820, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.019440 700060 task_exit.go:204] [ 819: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.020599 700060 task_exit.go:204] [ 819: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.020634 700060 task_exit.go:204] [ 819: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.020650 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.020685 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.020695 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.020864 700060 task_exit.go:204] [ 819: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.021390 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.022775 700060 syscalls.go:262] [ 824: 824] Allocating stack with size of 8388608 bytes D0713 05:28:07.022854 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.023936 700060 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.023966 700060 usertrap_amd64.go:106] [ 824: 824] Map a usertrap vma at 61000 D0713 05:28:07.024030 700060 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0021ac060 1 D0713 05:28:07.024045 700060 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:07.025055 700060 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.025089 700060 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0021ac060 2 D0713 05:28:07.025103 700060 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:07.026147 700060 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.026171 700060 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0021ac060 3 D0713 05:28:07.026183 700060 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:07.031862 700060 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.031892 700060 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0021ac060 4 D0713 05:28:07.031903 700060 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:07.032993 700060 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.033027 700060 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0021ac060 5 D0713 05:28:07.033039 700060 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:07.033089 700060 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.033105 700060 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0021ac060 6 D0713 05:28:07.033112 700060 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:07.033351 700060 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.033360 700060 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0021ac060 7 D0713 05:28:07.033368 700060 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:07.033519 700060 usertrap_amd64.go:212] [ 824: 825] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.033533 700060 usertrap_amd64.go:122] [ 824: 825] Allocate a new trap: 0xc0021ac060 8 D0713 05:28:07.033545 700060 usertrap_amd64.go:225] [ 824: 825] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:07.033744 700060 usertrap_amd64.go:212] [ 824: 825] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.033776 700060 usertrap_amd64.go:122] [ 824: 825] Allocate a new trap: 0xc0021ac060 9 D0713 05:28:07.033789 700060 usertrap_amd64.go:225] [ 824: 825] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:07.033812 700060 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.033820 700060 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0021ac060 10 D0713 05:28:07.033841 700060 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:07.040797 700060 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.040875 700060 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0021ac060 11 D0713 05:28:07.040886 700060 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:07.044594 700060 usertrap_amd64.go:212] [ 824: 825] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.044628 700060 usertrap_amd64.go:122] [ 824: 825] Allocate a new trap: 0xc0021ac060 12 D0713 05:28:07.044643 700060 usertrap_amd64.go:225] [ 824: 825] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:07.044681 700060 usertrap_amd64.go:212] [ 824: 825] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.044688 700060 usertrap_amd64.go:122] [ 824: 825] Allocate a new trap: 0xc0021ac060 13 D0713 05:28:07.044699 700060 usertrap_amd64.go:225] [ 824: 825] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:07.044716 700060 task_signals.go:470] [ 824: 824] Notified of signal 23 D0713 05:28:07.044750 700060 task_signals.go:220] [ 824: 824] Signal 23: delivering to handler I0713 05:28:07.050368 700060 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0713 05:28:07.050454 700060 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.050464 700060 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0021ac060 14 D0713 05:28:07.050472 700060 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:07.050533 700060 task_exit.go:204] [ 824: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.050568 700060 task_signals.go:204] [ 824: 826] Signal 824, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.050569 700060 task_exit.go:204] [ 824: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.050602 700060 task_signals.go:204] [ 824: 827] Signal 824, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.050624 700060 task_exit.go:204] [ 824: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.050661 700060 task_signals.go:204] [ 824: 825] Signal 824, PID: 825, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.050670 700060 task_signals.go:204] [ 824: 828] Signal 824, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.050691 700060 task_exit.go:204] [ 824: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.050698 700060 task_exit.go:204] [ 824: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.050712 700060 task_exit.go:204] [ 824: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.050720 700060 task_exit.go:204] [ 824: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.050726 700060 task_exit.go:204] [ 824: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.050736 700060 task_exit.go:204] [ 824: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.050755 700060 task_exit.go:204] [ 824: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.050763 700060 task_exit.go:204] [ 824: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.050773 700060 task_exit.go:204] [ 824: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.051876 700060 task_exit.go:204] [ 824: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.051903 700060 task_exit.go:204] [ 824: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.051916 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.051981 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.052002 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.052046 700060 task_exit.go:204] [ 824: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.052667 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.054081 700060 syscalls.go:262] [ 829: 829] Allocating stack with size of 8388608 bytes D0713 05:28:07.054217 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.059896 700060 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.059947 700060 usertrap_amd64.go:106] [ 829: 829] Map a usertrap vma at 69000 D0713 05:28:07.060061 700060 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc00161fd40 1 D0713 05:28:07.060099 700060 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:07.060543 700060 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.060605 700060 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc00161fd40 2 D0713 05:28:07.060627 700060 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:07.061324 700060 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.061365 700060 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc00161fd40 3 D0713 05:28:07.061376 700060 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:07.079562 700060 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.079601 700060 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc00161fd40 4 D0713 05:28:07.079612 700060 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:07.083810 700060 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.083845 700060 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc00161fd40 5 D0713 05:28:07.083856 700060 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:07.083914 700060 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.083929 700060 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc00161fd40 6 D0713 05:28:07.083938 700060 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:07.084278 700060 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.084367 700060 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc00161fd40 7 D0713 05:28:07.084410 700060 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:07.084632 700060 usertrap_amd64.go:212] [ 829: 830] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.084655 700060 usertrap_amd64.go:122] [ 829: 830] Allocate a new trap: 0xc00161fd40 8 D0713 05:28:07.084664 700060 usertrap_amd64.go:225] [ 829: 830] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:07.084827 700060 usertrap_amd64.go:212] [ 829: 830] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.084843 700060 usertrap_amd64.go:122] [ 829: 830] Allocate a new trap: 0xc00161fd40 9 D0713 05:28:07.084849 700060 usertrap_amd64.go:225] [ 829: 830] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:07.084860 700060 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.084872 700060 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc00161fd40 10 D0713 05:28:07.084879 700060 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:07.095238 700060 usertrap_amd64.go:212] [ 829: 830] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.095319 700060 usertrap_amd64.go:122] [ 829: 830] Allocate a new trap: 0xc00161fd40 11 D0713 05:28:07.095343 700060 usertrap_amd64.go:225] [ 829: 830] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:07.095403 700060 usertrap_amd64.go:212] [ 829: 830] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.095418 700060 usertrap_amd64.go:122] [ 829: 830] Allocate a new trap: 0xc00161fd40 12 D0713 05:28:07.095432 700060 usertrap_amd64.go:225] [ 829: 830] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:07.095497 700060 task_signals.go:470] [ 829: 829] Notified of signal 23 D0713 05:28:07.099718 700060 task_signals.go:220] [ 829: 829] Signal 23: delivering to handler D0713 05:28:07.106104 700060 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.106130 700060 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc00161fd40 13 D0713 05:28:07.106140 700060 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:07.110871 700060 task_signals.go:470] [ 829: 829] Notified of signal 23 D0713 05:28:07.111329 700060 task_signals.go:220] [ 829: 829] Signal 23: delivering to handler I0713 05:28:07.119445 700060 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0713 05:28:07.119803 700060 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.119884 700060 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc00161fd40 14 D0713 05:28:07.119908 700060 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:07.120027 700060 task_exit.go:204] [ 829: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.120070 700060 task_exit.go:204] [ 829: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.120091 700060 task_signals.go:204] [ 829: 830] Signal 829, PID: 830, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.120115 700060 task_signals.go:204] [ 829: 832] Signal 829, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.120144 700060 task_exit.go:204] [ 829: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.120170 700060 task_signals.go:204] [ 829: 831] Signal 829, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.120194 700060 task_exit.go:204] [ 829: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.120193 700060 task_signals.go:204] [ 829: 833] Signal 829, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.120250 700060 task_exit.go:204] [ 829: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.120274 700060 task_exit.go:204] [ 829: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.120300 700060 task_exit.go:204] [ 829: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.120331 700060 task_exit.go:204] [ 829: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.120350 700060 task_exit.go:204] [ 829: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.120362 700060 task_exit.go:204] [ 829: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.120370 700060 task_exit.go:204] [ 829: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.120381 700060 task_exit.go:204] [ 829: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.122096 700060 task_exit.go:204] [ 829: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.122328 700060 task_exit.go:204] [ 829: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.122497 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.122566 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.122581 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.122688 700060 task_exit.go:204] [ 829: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.123240 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.124469 700060 syscalls.go:262] [ 834: 834] Allocating stack with size of 8388608 bytes D0713 05:28:07.124610 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.126475 700060 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.126514 700060 usertrap_amd64.go:106] [ 834: 834] Map a usertrap vma at 60000 D0713 05:28:07.126642 700060 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc0021ac5d0 1 D0713 05:28:07.126671 700060 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:07.128304 700060 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.128350 700060 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc0021ac5d0 2 D0713 05:28:07.128371 700060 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:07.129184 700060 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.129227 700060 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc0021ac5d0 3 D0713 05:28:07.129253 700060 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:07.136879 700060 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.136931 700060 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc0021ac5d0 4 D0713 05:28:07.136978 700060 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:07.138933 700060 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.139021 700060 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc0021ac5d0 5 D0713 05:28:07.139042 700060 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:07.139114 700060 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.139145 700060 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc0021ac5d0 6 D0713 05:28:07.139156 700060 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:07.139435 700060 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.139452 700060 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc0021ac5d0 7 D0713 05:28:07.139466 700060 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:07.139856 700060 usertrap_amd64.go:212] [ 834: 835] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.139896 700060 usertrap_amd64.go:122] [ 834: 835] Allocate a new trap: 0xc0021ac5d0 8 D0713 05:28:07.139909 700060 usertrap_amd64.go:225] [ 834: 835] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:07.140329 700060 usertrap_amd64.go:212] [ 834: 835] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.140355 700060 usertrap_amd64.go:122] [ 834: 835] Allocate a new trap: 0xc0021ac5d0 9 D0713 05:28:07.140365 700060 usertrap_amd64.go:225] [ 834: 835] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:07.140445 700060 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.140453 700060 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc0021ac5d0 10 D0713 05:28:07.140461 700060 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:07.149921 700060 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.149977 700060 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc0021ac5d0 11 D0713 05:28:07.149991 700060 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:07.150681 700060 usertrap_amd64.go:212] [ 834: 835] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.150719 700060 usertrap_amd64.go:122] [ 834: 835] Allocate a new trap: 0xc0021ac5d0 12 D0713 05:28:07.150736 700060 usertrap_amd64.go:225] [ 834: 835] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:07.150788 700060 usertrap_amd64.go:212] [ 834: 835] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.150797 700060 usertrap_amd64.go:122] [ 834: 835] Allocate a new trap: 0xc0021ac5d0 13 D0713 05:28:07.150805 700060 usertrap_amd64.go:225] [ 834: 835] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:07.150824 700060 task_signals.go:470] [ 834: 834] Notified of signal 23 D0713 05:28:07.150898 700060 task_signals.go:220] [ 834: 834] Signal 23: delivering to handler D0713 05:28:07.151020 700060 task_signals.go:481] [ 834: 834] No task notified of signal 23 D0713 05:28:07.151043 700060 task_signals.go:220] [ 834: 834] Signal 23: delivering to handler D0713 05:28:07.163223 700060 usertrap_amd64.go:212] [ 834: 834] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.163272 700060 usertrap_amd64.go:122] [ 834: 834] Allocate a new trap: 0xc0021ac5d0 14 D0713 05:28:07.163290 700060 usertrap_amd64.go:225] [ 834: 834] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:07.163245 700060 task_signals.go:470] [ 834: 834] Notified of signal 23 D0713 05:28:07.163328 700060 task_signals.go:220] [ 834: 834] Signal 23: delivering to handler D0713 05:28:07.163377 700060 task_exit.go:204] [ 834: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.163404 700060 task_exit.go:204] [ 834: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.163433 700060 task_signals.go:204] [ 834: 837] Signal 834, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.163431 700060 task_signals.go:204] [ 834: 836] Signal 834, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.163447 700060 task_exit.go:204] [ 834: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.163457 700060 task_signals.go:204] [ 834: 835] Signal 834, PID: 835, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.163457 700060 task_exit.go:204] [ 834: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.163486 700060 task_exit.go:204] [ 834: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.163503 700060 task_signals.go:204] [ 834: 838] Signal 834, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.163537 700060 task_exit.go:204] [ 834: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.163546 700060 task_exit.go:204] [ 834: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.163551 700060 task_exit.go:204] [ 834: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.163561 700060 task_exit.go:204] [ 834: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.163570 700060 task_exit.go:204] [ 834: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.163575 700060 task_exit.go:204] [ 834: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.163585 700060 task_exit.go:204] [ 834: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.164876 700060 task_exit.go:204] [ 834: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.164910 700060 task_exit.go:204] [ 834: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.164934 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.165013 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.165023 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.165335 700060 task_exit.go:204] [ 834: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.170910 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.173609 700060 syscalls.go:262] [ 839: 839] Allocating stack with size of 8388608 bytes D0713 05:28:07.173847 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.183130 700060 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.183220 700060 usertrap_amd64.go:106] [ 839: 839] Map a usertrap vma at 60000 D0713 05:28:07.183352 700060 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc0022b4030 1 D0713 05:28:07.183401 700060 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:07.183779 700060 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.183807 700060 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc0022b4030 2 D0713 05:28:07.183819 700060 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:07.184608 700060 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.184639 700060 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc0022b4030 3 D0713 05:28:07.184653 700060 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:07.190219 700060 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.190253 700060 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc0022b4030 4 D0713 05:28:07.190267 700060 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:07.191555 700060 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.191574 700060 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc0022b4030 5 D0713 05:28:07.191583 700060 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:07.191632 700060 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.191638 700060 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc0022b4030 6 D0713 05:28:07.191644 700060 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:07.191826 700060 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.191834 700060 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc0022b4030 7 D0713 05:28:07.191840 700060 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:07.192007 700060 usertrap_amd64.go:212] [ 839: 840] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.192016 700060 usertrap_amd64.go:122] [ 839: 840] Allocate a new trap: 0xc0022b4030 8 D0713 05:28:07.192023 700060 usertrap_amd64.go:225] [ 839: 840] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:07.192183 700060 usertrap_amd64.go:212] [ 839: 840] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.192200 700060 usertrap_amd64.go:122] [ 839: 840] Allocate a new trap: 0xc0022b4030 9 D0713 05:28:07.192212 700060 usertrap_amd64.go:225] [ 839: 840] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:07.192410 700060 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.192438 700060 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc0022b4030 10 D0713 05:28:07.192447 700060 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:07.203198 700060 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.203235 700060 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc0022b4030 11 D0713 05:28:07.203250 700060 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:07.203812 700060 usertrap_amd64.go:212] [ 839: 840] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.203849 700060 usertrap_amd64.go:122] [ 839: 840] Allocate a new trap: 0xc0022b4030 12 D0713 05:28:07.203874 700060 usertrap_amd64.go:225] [ 839: 840] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:07.203934 700060 usertrap_amd64.go:212] [ 839: 840] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.203963 700060 usertrap_amd64.go:122] [ 839: 840] Allocate a new trap: 0xc0022b4030 13 D0713 05:28:07.203974 700060 usertrap_amd64.go:225] [ 839: 840] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:07.204006 700060 task_signals.go:470] [ 839: 839] Notified of signal 23 D0713 05:28:07.204097 700060 task_signals.go:220] [ 839: 839] Signal 23: delivering to handler I0713 05:28:07.214514 700060 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0713 05:28:07.214611 700060 usertrap_amd64.go:212] [ 839: 839] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.214625 700060 usertrap_amd64.go:122] [ 839: 839] Allocate a new trap: 0xc0022b4030 14 D0713 05:28:07.214640 700060 usertrap_amd64.go:225] [ 839: 839] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:07.214726 700060 task_exit.go:204] [ 839: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.214764 700060 task_exit.go:204] [ 839: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.214791 700060 task_signals.go:204] [ 839: 843] Signal 839, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.214815 700060 task_exit.go:204] [ 839: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.214812 700060 task_signals.go:204] [ 839: 840] Signal 839, PID: 840, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.214787 700060 task_signals.go:204] [ 839: 842] Signal 839, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.214824 700060 task_exit.go:204] [ 839: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.214843 700060 task_exit.go:204] [ 839: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.214830 700060 task_signals.go:204] [ 839: 841] Signal 839, PID: 841, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.214875 700060 task_exit.go:204] [ 839: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.214923 700060 task_exit.go:204] [ 839: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.214943 700060 task_exit.go:204] [ 839: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.215027 700060 task_exit.go:204] [ 839: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.215041 700060 task_exit.go:204] [ 839: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.215048 700060 task_exit.go:204] [ 839: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.215064 700060 task_exit.go:204] [ 839: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.216368 700060 task_exit.go:204] [ 839: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.216399 700060 task_exit.go:204] [ 839: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.216413 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.216438 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.216444 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.216601 700060 task_exit.go:204] [ 839: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.217494 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.219575 700060 syscalls.go:262] [ 844: 844] Allocating stack with size of 8388608 bytes D0713 05:28:07.219705 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.221133 700060 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.221178 700060 usertrap_amd64.go:106] [ 844: 844] Map a usertrap vma at 63000 D0713 05:28:07.221287 700060 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000da28a0 1 D0713 05:28:07.221315 700060 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:07.221630 700060 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.221677 700060 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000da28a0 2 D0713 05:28:07.221691 700060 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:07.222286 700060 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.222306 700060 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000da28a0 3 D0713 05:28:07.222315 700060 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:07.229766 700060 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.229797 700060 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000da28a0 4 D0713 05:28:07.229808 700060 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:07.230595 700060 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.230642 700060 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000da28a0 5 D0713 05:28:07.230658 700060 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:07.230711 700060 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.230716 700060 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000da28a0 6 D0713 05:28:07.230722 700060 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:07.230889 700060 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.230904 700060 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000da28a0 7 D0713 05:28:07.230915 700060 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:07.231163 700060 usertrap_amd64.go:212] [ 844: 845] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.231196 700060 usertrap_amd64.go:122] [ 844: 845] Allocate a new trap: 0xc000da28a0 8 D0713 05:28:07.231206 700060 usertrap_amd64.go:225] [ 844: 845] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:07.231620 700060 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.231644 700060 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000da28a0 9 D0713 05:28:07.231656 700060 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:07.231787 700060 usertrap_amd64.go:212] [ 844: 845] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.231802 700060 usertrap_amd64.go:122] [ 844: 845] Allocate a new trap: 0xc000da28a0 10 D0713 05:28:07.231813 700060 usertrap_amd64.go:225] [ 844: 845] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:07.240816 700060 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.240840 700060 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000da28a0 11 D0713 05:28:07.240855 700060 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:07.244166 700060 usertrap_amd64.go:212] [ 844: 845] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.244577 700060 usertrap_amd64.go:122] [ 844: 845] Allocate a new trap: 0xc000da28a0 12 D0713 05:28:07.244671 700060 usertrap_amd64.go:225] [ 844: 845] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:07.244892 700060 usertrap_amd64.go:212] [ 844: 845] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.244913 700060 usertrap_amd64.go:122] [ 844: 845] Allocate a new trap: 0xc000da28a0 13 D0713 05:28:07.244926 700060 usertrap_amd64.go:225] [ 844: 845] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:07.245085 700060 task_signals.go:470] [ 844: 844] Notified of signal 23 D0713 05:28:07.245298 700060 task_signals.go:220] [ 844: 844] Signal 23: delivering to handler D0713 05:28:07.256209 700060 task_signals.go:470] [ 844: 844] Notified of signal 23 D0713 05:28:07.256314 700060 task_signals.go:220] [ 844: 844] Signal 23: delivering to handler I0713 05:28:07.256594 700060 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0713 05:28:07.256678 700060 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.256694 700060 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000da28a0 14 D0713 05:28:07.256711 700060 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:07.256782 700060 task_exit.go:204] [ 844: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.256859 700060 task_signals.go:204] [ 844: 845] Signal 844, PID: 845, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.256903 700060 task_signals.go:204] [ 844: 848] Signal 844, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.256923 700060 task_signals.go:204] [ 844: 847] Signal 844, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.256962 700060 task_signals.go:204] [ 844: 846] Signal 844, PID: 846, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.256999 700060 task_exit.go:204] [ 844: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.257024 700060 task_exit.go:204] [ 844: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.257039 700060 task_exit.go:204] [ 844: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.257044 700060 task_exit.go:204] [ 844: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.257057 700060 task_exit.go:204] [ 844: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.257068 700060 task_exit.go:204] [ 844: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.257072 700060 task_exit.go:204] [ 844: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.257082 700060 task_exit.go:204] [ 844: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.257089 700060 task_exit.go:204] [ 844: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.257093 700060 task_exit.go:204] [ 844: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.257109 700060 task_exit.go:204] [ 844: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.258263 700060 task_exit.go:204] [ 844: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.258290 700060 task_exit.go:204] [ 844: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.258302 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.258367 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.258429 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.258543 700060 task_exit.go:204] [ 844: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.259172 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.260569 700060 syscalls.go:262] [ 849: 849] Allocating stack with size of 8388608 bytes D0713 05:28:07.260806 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.261923 700060 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.261955 700060 usertrap_amd64.go:106] [ 849: 849] Map a usertrap vma at 60000 D0713 05:28:07.262033 700060 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc0022b42d0 1 D0713 05:28:07.262049 700060 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:07.262364 700060 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.262383 700060 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc0022b42d0 2 D0713 05:28:07.262391 700060 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:07.262791 700060 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.262813 700060 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc0022b42d0 3 D0713 05:28:07.262823 700060 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:07.271372 700060 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.271426 700060 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc0022b42d0 4 D0713 05:28:07.271445 700060 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:07.273058 700060 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.273087 700060 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc0022b42d0 5 D0713 05:28:07.273099 700060 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:07.273159 700060 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.273175 700060 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc0022b42d0 6 D0713 05:28:07.273183 700060 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:07.273449 700060 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.273466 700060 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc0022b42d0 7 D0713 05:28:07.273472 700060 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:07.273586 700060 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.273601 700060 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc0022b42d0 8 D0713 05:28:07.273607 700060 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:07.273764 700060 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.273785 700060 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc0022b42d0 9 D0713 05:28:07.273794 700060 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:07.274008 700060 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.274043 700060 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc0022b42d0 10 D0713 05:28:07.274060 700060 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:07.283551 700060 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.283594 700060 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc0022b42d0 11 D0713 05:28:07.283613 700060 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:07.286746 700060 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.286810 700060 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc0022b42d0 12 D0713 05:28:07.286826 700060 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:07.286870 700060 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.286879 700060 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc0022b42d0 13 D0713 05:28:07.286888 700060 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:07.286908 700060 task_signals.go:470] [ 849: 849] Notified of signal 23 D0713 05:28:07.286977 700060 task_signals.go:220] [ 849: 849] Signal 23: delivering to handler D0713 05:28:07.295372 700060 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.295401 700060 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc0022b42d0 14 D0713 05:28:07.295412 700060 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:07.295461 700060 task_exit.go:204] [ 849: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.295488 700060 task_exit.go:204] [ 849: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.295546 700060 task_signals.go:204] [ 849: 853] Signal 849, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.295563 700060 task_signals.go:204] [ 849: 851] Signal 849, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.295567 700060 task_exit.go:204] [ 849: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.295601 700060 task_signals.go:204] [ 849: 852] Signal 849, PID: 852, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.295622 700060 task_signals.go:204] [ 849: 850] Signal 849, PID: 850, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.295633 700060 task_exit.go:204] [ 849: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.295644 700060 task_exit.go:204] [ 849: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.295657 700060 task_exit.go:204] [ 849: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.295668 700060 task_exit.go:204] [ 849: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.295672 700060 task_exit.go:204] [ 849: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.295680 700060 task_exit.go:204] [ 849: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.295691 700060 task_exit.go:204] [ 849: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.295695 700060 task_exit.go:204] [ 849: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.295705 700060 task_exit.go:204] [ 849: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.298329 700060 task_exit.go:204] [ 849: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.298356 700060 task_exit.go:204] [ 849: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.298371 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.298403 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.298427 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.298585 700060 task_exit.go:204] [ 849: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.299521 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.301521 700060 syscalls.go:262] [ 854: 854] Allocating stack with size of 8388608 bytes D0713 05:28:07.301809 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.302369 700060 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.302489 700060 usertrap_amd64.go:106] [ 854: 854] Map a usertrap vma at 65000 D0713 05:28:07.302613 700060 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000da2930 1 D0713 05:28:07.302721 700060 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:07.306249 700060 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.306279 700060 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000da2930 2 D0713 05:28:07.306296 700060 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:07.306876 700060 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.306903 700060 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000da2930 3 D0713 05:28:07.306913 700060 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:07.314759 700060 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.314794 700060 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000da2930 4 D0713 05:28:07.314807 700060 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:07.317828 700060 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.317857 700060 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000da2930 5 D0713 05:28:07.317867 700060 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:07.317912 700060 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.317919 700060 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000da2930 6 D0713 05:28:07.317927 700060 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:07.318137 700060 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.318159 700060 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000da2930 7 D0713 05:28:07.318166 700060 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:07.318348 700060 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.318370 700060 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc000da2930 8 D0713 05:28:07.318380 700060 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:07.318562 700060 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.318583 700060 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc000da2930 9 D0713 05:28:07.318592 700060 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:07.318667 700060 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.318688 700060 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000da2930 10 D0713 05:28:07.318697 700060 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:07.328618 700060 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.328685 700060 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000da2930 11 D0713 05:28:07.328706 700060 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:07.329662 700060 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.329708 700060 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc000da2930 12 D0713 05:28:07.329727 700060 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:07.329889 700060 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.329924 700060 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc000da2930 13 D0713 05:28:07.329937 700060 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:07.330037 700060 task_signals.go:470] [ 854: 854] Notified of signal 23 D0713 05:28:07.330208 700060 task_signals.go:220] [ 854: 854] Signal 23: delivering to handler D0713 05:28:07.341074 700060 task_signals.go:470] [ 854: 854] Notified of signal 23 D0713 05:28:07.343749 700060 task_signals.go:220] [ 854: 854] Signal 23: delivering to handler I0713 05:28:07.344311 700060 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0713 05:28:07.344440 700060 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.344458 700060 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc000da2930 14 D0713 05:28:07.344470 700060 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:07.344542 700060 task_exit.go:204] [ 854: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.344569 700060 task_exit.go:204] [ 854: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.344595 700060 task_signals.go:204] [ 854: 857] Signal 854, PID: 857, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.344610 700060 task_signals.go:204] [ 854: 855] Signal 854, PID: 855, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.344632 700060 task_exit.go:204] [ 854: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.344684 700060 task_signals.go:204] [ 854: 858] Signal 854, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.344709 700060 task_exit.go:204] [ 854: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.344728 700060 task_exit.go:204] [ 854: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.344754 700060 task_exit.go:204] [ 854: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.344830 700060 task_signals.go:204] [ 854: 856] Signal 854, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.344863 700060 task_exit.go:204] [ 854: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.344885 700060 task_exit.go:204] [ 854: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.344901 700060 task_exit.go:204] [ 854: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.344912 700060 task_exit.go:204] [ 854: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.344920 700060 task_exit.go:204] [ 854: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.344932 700060 task_exit.go:204] [ 854: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.346437 700060 task_exit.go:204] [ 854: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.346464 700060 task_exit.go:204] [ 854: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.346481 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.346521 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.346538 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.346632 700060 task_exit.go:204] [ 854: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.346748 700060 task_signals.go:470] [ 5: 19] Notified of signal 23 D0713 05:28:07.346847 700060 task_signals.go:220] [ 5: 19] Signal 23: delivering to handler D0713 05:28:07.347468 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.349162 700060 syscalls.go:262] [ 859: 859] Allocating stack with size of 8388608 bytes D0713 05:28:07.349315 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.351338 700060 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.351379 700060 usertrap_amd64.go:106] [ 859: 859] Map a usertrap vma at 60000 D0713 05:28:07.351464 700060 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc000da29c0 1 D0713 05:28:07.351503 700060 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:07.351904 700060 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.351931 700060 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc000da29c0 2 D0713 05:28:07.351973 700060 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:07.352705 700060 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.352727 700060 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc000da29c0 3 D0713 05:28:07.352736 700060 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:07.360024 700060 sampler.go:191] Time: Adjusting syscall overhead down to 671 D0713 05:28:07.360551 700060 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.360575 700060 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc000da29c0 4 D0713 05:28:07.360585 700060 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:07.361863 700060 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.361885 700060 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc000da29c0 5 D0713 05:28:07.361893 700060 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:07.361955 700060 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.361967 700060 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc000da29c0 6 D0713 05:28:07.361974 700060 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:07.362435 700060 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.362452 700060 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc000da29c0 7 D0713 05:28:07.362460 700060 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:07.362602 700060 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.362627 700060 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc000da29c0 8 D0713 05:28:07.362642 700060 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:07.362983 700060 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.363004 700060 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc000da29c0 9 D0713 05:28:07.363019 700060 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:07.363034 700060 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.363051 700060 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc000da29c0 10 D0713 05:28:07.363062 700060 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:07.372028 700060 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.372064 700060 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc000da29c0 11 D0713 05:28:07.372097 700060 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:07.375505 700060 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.375536 700060 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc000da29c0 12 D0713 05:28:07.375552 700060 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:07.377111 700060 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.377145 700060 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc000da29c0 13 D0713 05:28:07.377166 700060 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:07.377209 700060 task_signals.go:470] [ 859: 859] Notified of signal 23 D0713 05:28:07.377277 700060 task_signals.go:220] [ 859: 859] Signal 23: delivering to handler I0713 05:28:07.384721 700060 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0713 05:28:07.384808 700060 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.384820 700060 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc000da29c0 14 D0713 05:28:07.384833 700060 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:07.384900 700060 task_exit.go:204] [ 859: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.384925 700060 task_exit.go:204] [ 859: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.385005 700060 task_signals.go:204] [ 859: 861] Signal 859, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.385020 700060 task_exit.go:204] [ 859: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.385018 700060 task_signals.go:204] [ 859: 860] Signal 859, PID: 860, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.385028 700060 task_exit.go:204] [ 859: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.385011 700060 task_signals.go:204] [ 859: 863] Signal 859, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.385034 700060 task_exit.go:204] [ 859: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.384998 700060 task_signals.go:204] [ 859: 862] Signal 859, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.385048 700060 task_exit.go:204] [ 859: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.385056 700060 task_exit.go:204] [ 859: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.385072 700060 task_exit.go:204] [ 859: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.385079 700060 task_exit.go:204] [ 859: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.385126 700060 task_exit.go:204] [ 859: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.385150 700060 task_exit.go:204] [ 859: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.385159 700060 task_exit.go:204] [ 859: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.386419 700060 task_exit.go:204] [ 859: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.386448 700060 task_exit.go:204] [ 859: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.386471 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.386505 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.386557 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.386729 700060 task_exit.go:204] [ 859: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.387304 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.389397 700060 syscalls.go:262] [ 864: 864] Allocating stack with size of 8388608 bytes D0713 05:28:07.389497 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.391865 700060 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.391891 700060 usertrap_amd64.go:106] [ 864: 864] Map a usertrap vma at 68000 D0713 05:28:07.392006 700060 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0021ac390 1 D0713 05:28:07.392037 700060 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:07.392262 700060 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.392276 700060 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0021ac390 2 D0713 05:28:07.392289 700060 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:07.392987 700060 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.393017 700060 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0021ac390 3 D0713 05:28:07.393028 700060 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:07.399835 700060 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.399869 700060 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0021ac390 4 D0713 05:28:07.399883 700060 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:07.401184 700060 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.401214 700060 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0021ac390 5 D0713 05:28:07.401224 700060 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:07.401295 700060 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.401310 700060 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0021ac390 6 D0713 05:28:07.401316 700060 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:07.401799 700060 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.401822 700060 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0021ac390 7 D0713 05:28:07.401829 700060 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:07.402057 700060 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.402120 700060 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc0021ac390 8 D0713 05:28:07.402148 700060 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:07.402390 700060 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.402438 700060 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc0021ac390 9 D0713 05:28:07.402452 700060 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:07.402521 700060 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.402552 700060 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0021ac390 10 D0713 05:28:07.402562 700060 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:07.402826 700060 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.402857 700060 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc0021ac390 11 D0713 05:28:07.402899 700060 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:07.402960 700060 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.402983 700060 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc0021ac390 12 D0713 05:28:07.402998 700060 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:07.403089 700060 task_signals.go:470] [ 864: 867] Notified of signal 23 D0713 05:28:07.403118 700060 task_signals.go:179] [ 864: 867] Restarting syscall 202: interrupted by signal 23 D0713 05:28:07.403152 700060 task_signals.go:220] [ 864: 867] Signal 23: delivering to handler D0713 05:28:07.412437 700060 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.412545 700060 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0021ac390 13 D0713 05:28:07.412631 700060 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:07.413336 700060 task_signals.go:470] [ 864: 864] Notified of signal 23 D0713 05:28:07.413490 700060 task_signals.go:220] [ 864: 864] Signal 23: delivering to handler D0713 05:28:07.424742 700060 task_signals.go:470] [ 864: 864] Notified of signal 23 D0713 05:28:07.426939 700060 task_signals.go:220] [ 864: 864] Signal 23: delivering to handler D0713 05:28:07.429171 700060 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.429251 700060 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0021ac390 14 D0713 05:28:07.429274 700060 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:07.429536 700060 task_exit.go:204] [ 864: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.429639 700060 task_exit.go:204] [ 864: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.429659 700060 task_signals.go:204] [ 864: 868] Signal 864, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.429704 700060 task_signals.go:204] [ 864: 867] Signal 864, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.429708 700060 task_exit.go:204] [ 864: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.429740 700060 task_exit.go:204] [ 864: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.429747 700060 task_exit.go:204] [ 864: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.429684 700060 task_signals.go:204] [ 864: 865] Signal 864, PID: 865, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.429779 700060 task_exit.go:204] [ 864: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.429787 700060 task_exit.go:204] [ 864: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.429793 700060 task_exit.go:204] [ 864: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.429782 700060 task_signals.go:204] [ 864: 866] Signal 864, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.429813 700060 task_exit.go:204] [ 864: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.429836 700060 task_exit.go:204] [ 864: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.429855 700060 task_exit.go:204] [ 864: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.429881 700060 task_exit.go:204] [ 864: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.431120 700060 task_exit.go:204] [ 864: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.431161 700060 task_exit.go:204] [ 864: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.431179 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.431212 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.431222 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.431430 700060 task_exit.go:204] [ 864: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.431998 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.433207 700060 syscalls.go:262] [ 869: 869] Allocating stack with size of 8388608 bytes D0713 05:28:07.433319 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.435242 700060 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.435387 700060 usertrap_amd64.go:106] [ 869: 869] Map a usertrap vma at 68000 D0713 05:28:07.435516 700060 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000da3080 1 D0713 05:28:07.435630 700060 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:07.436109 700060 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.436134 700060 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000da3080 2 D0713 05:28:07.436145 700060 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:07.436764 700060 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.436791 700060 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000da3080 3 D0713 05:28:07.436801 700060 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:07.449587 700060 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.449656 700060 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000da3080 4 D0713 05:28:07.449680 700060 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:07.451011 700060 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.451051 700060 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000da3080 5 D0713 05:28:07.451066 700060 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:07.451101 700060 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.451111 700060 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000da3080 6 D0713 05:28:07.451118 700060 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:07.451333 700060 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.451358 700060 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000da3080 7 D0713 05:28:07.451368 700060 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:07.451540 700060 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.451570 700060 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc000da3080 8 D0713 05:28:07.451583 700060 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:07.451756 700060 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:07.451785 700060 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc000da3080 9 D0713 05:28:07.451796 700060 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b6e0 trap addr 682d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:07.451879 700060 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.451900 700060 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc000da3080 10 D0713 05:28:07.451907 700060 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:07.451968 700060 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.451977 700060 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc000da3080 11 D0713 05:28:07.451986 700060 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46af76 trap addr 68370 ([184 35 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:07.461497 700060 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.461516 700060 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000da3080 12 D0713 05:28:07.461530 700060 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:07.463902 700060 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.463937 700060 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc000da3080 13 D0713 05:28:07.463952 700060 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:07.463990 700060 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.463998 700060 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc000da3080 14 D0713 05:28:07.464005 700060 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:07.464038 700060 task_signals.go:470] [ 869: 869] Notified of signal 23 D0713 05:28:07.464125 700060 task_signals.go:220] [ 869: 869] Signal 23: delivering to handler D0713 05:28:07.472619 700060 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.472662 700060 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000da3080 15 D0713 05:28:07.472678 700060 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 05:28:07.472752 700060 task_exit.go:204] [ 869: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.472778 700060 task_exit.go:204] [ 869: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.472804 700060 task_signals.go:204] [ 869: 874] Signal 869, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.472800 700060 task_signals.go:204] [ 869: 873] Signal 869, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.472823 700060 task_signals.go:204] [ 869: 871] Signal 869, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.472838 700060 task_exit.go:204] [ 869: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.472850 700060 task_signals.go:204] [ 869: 872] Signal 869, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.472869 700060 task_signals.go:204] [ 869: 870] Signal 869, PID: 870, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.472883 700060 task_exit.go:204] [ 869: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.472914 700060 task_exit.go:204] [ 869: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.472926 700060 task_exit.go:204] [ 869: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.472992 700060 task_exit.go:204] [ 869: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.473001 700060 task_exit.go:204] [ 869: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.473039 700060 task_exit.go:204] [ 869: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.473160 700060 task_exit.go:204] [ 869: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.473182 700060 task_exit.go:204] [ 869: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.473219 700060 task_exit.go:204] [ 869: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.473271 700060 task_exit.go:204] [ 869: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.473278 700060 task_exit.go:204] [ 869: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.473294 700060 task_exit.go:204] [ 869: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.474933 700060 task_exit.go:204] [ 869: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.475009 700060 task_exit.go:204] [ 869: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.475038 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.480134 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.480166 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.480510 700060 task_exit.go:204] [ 869: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.481685 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.483353 700060 syscalls.go:262] [ 875: 875] Allocating stack with size of 8388608 bytes D0713 05:28:07.483557 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.485136 700060 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.485211 700060 usertrap_amd64.go:106] [ 875: 875] Map a usertrap vma at 66000 D0713 05:28:07.485363 700060 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0006269c0 1 D0713 05:28:07.485411 700060 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:07.485908 700060 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.485941 700060 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0006269c0 2 D0713 05:28:07.485956 700060 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:07.486972 700060 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.487008 700060 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0006269c0 3 D0713 05:28:07.487023 700060 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:07.495157 700060 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.495203 700060 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0006269c0 4 D0713 05:28:07.495219 700060 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:07.496509 700060 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.496558 700060 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0006269c0 5 D0713 05:28:07.496575 700060 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:07.496638 700060 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.496660 700060 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0006269c0 6 D0713 05:28:07.496671 700060 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:07.497271 700060 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.497293 700060 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0006269c0 7 D0713 05:28:07.497306 700060 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:07.497567 700060 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.497619 700060 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0006269c0 8 D0713 05:28:07.497654 700060 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:07.497933 700060 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.497964 700060 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0006269c0 9 D0713 05:28:07.498056 700060 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:07.498103 700060 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.498114 700060 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0006269c0 10 D0713 05:28:07.498126 700060 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:07.507050 700060 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.507088 700060 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0006269c0 11 D0713 05:28:07.507101 700060 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:07.510786 700060 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.510818 700060 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0006269c0 12 D0713 05:28:07.510832 700060 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:07.510917 700060 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.511015 700060 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0006269c0 13 D0713 05:28:07.511049 700060 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:07.511146 700060 task_signals.go:470] [ 875: 875] Notified of signal 23 D0713 05:28:07.511268 700060 task_signals.go:220] [ 875: 875] Signal 23: delivering to handler D0713 05:28:07.521569 700060 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.521630 700060 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0006269c0 14 D0713 05:28:07.521667 700060 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:07.521742 700060 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.521778 700060 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.521814 700060 task_signals.go:204] [ 875: 876] Signal 875, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.521833 700060 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.521843 700060 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.521849 700060 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.521883 700060 task_signals.go:204] [ 875: 877] Signal 875, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.521905 700060 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.521912 700060 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.521933 700060 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.521951 700060 task_signals.go:204] [ 875: 878] Signal 875, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.521963 700060 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.521972 700060 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.521985 700060 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.522011 700060 task_signals.go:204] [ 875: 879] Signal 875, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.522022 700060 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.522030 700060 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.522043 700060 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.522067 700060 task_signals.go:204] [ 875: 880] Signal 875, PID: 880, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.522087 700060 task_exit.go:204] [ 875: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.523630 700060 task_exit.go:204] [ 875: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.523670 700060 task_exit.go:204] [ 875: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.523691 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.523727 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.523737 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.523937 700060 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.525230 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.526795 700060 syscalls.go:262] [ 881: 881] Allocating stack with size of 8388608 bytes D0713 05:28:07.526927 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.529771 700060 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.529819 700060 usertrap_amd64.go:106] [ 881: 881] Map a usertrap vma at 69000 D0713 05:28:07.529897 700060 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000da32c0 1 D0713 05:28:07.529922 700060 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:07.530301 700060 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.530325 700060 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000da32c0 2 D0713 05:28:07.530337 700060 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:07.531005 700060 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.531030 700060 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000da32c0 3 D0713 05:28:07.531041 700060 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:07.538462 700060 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.538502 700060 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000da32c0 4 D0713 05:28:07.538520 700060 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:07.540104 700060 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.540153 700060 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000da32c0 5 D0713 05:28:07.540174 700060 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:07.540241 700060 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.540249 700060 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000da32c0 6 D0713 05:28:07.540270 700060 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:07.540894 700060 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.540926 700060 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000da32c0 7 D0713 05:28:07.540994 700060 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:07.541344 700060 usertrap_amd64.go:212] [ 881: 882] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.541372 700060 usertrap_amd64.go:122] [ 881: 882] Allocate a new trap: 0xc000da32c0 8 D0713 05:28:07.541383 700060 usertrap_amd64.go:225] [ 881: 882] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:07.541650 700060 usertrap_amd64.go:212] [ 881: 882] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.541680 700060 usertrap_amd64.go:122] [ 881: 882] Allocate a new trap: 0xc000da32c0 9 D0713 05:28:07.541696 700060 usertrap_amd64.go:225] [ 881: 882] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:07.541713 700060 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.541721 700060 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000da32c0 10 D0713 05:28:07.541790 700060 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:07.551273 700060 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.551313 700060 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000da32c0 11 D0713 05:28:07.551331 700060 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:07.554260 700060 usertrap_amd64.go:212] [ 881: 882] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.554312 700060 usertrap_amd64.go:122] [ 881: 882] Allocate a new trap: 0xc000da32c0 12 D0713 05:28:07.554344 700060 usertrap_amd64.go:225] [ 881: 882] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:07.554483 700060 usertrap_amd64.go:212] [ 881: 882] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.554511 700060 usertrap_amd64.go:122] [ 881: 882] Allocate a new trap: 0xc000da32c0 13 D0713 05:28:07.554522 700060 usertrap_amd64.go:225] [ 881: 882] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:07.554591 700060 task_signals.go:470] [ 881: 881] Notified of signal 23 D0713 05:28:07.555468 700060 task_signals.go:220] [ 881: 881] Signal 23: delivering to handler D0713 05:28:07.564179 700060 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.564232 700060 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000da32c0 14 D0713 05:28:07.564251 700060 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:07.564319 700060 task_exit.go:204] [ 881: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.564362 700060 task_exit.go:204] [ 881: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.564393 700060 task_signals.go:204] [ 881: 882] Signal 881, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.564429 700060 task_exit.go:204] [ 881: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.564437 700060 task_exit.go:204] [ 881: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.564443 700060 task_exit.go:204] [ 881: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.564460 700060 task_signals.go:204] [ 881: 883] Signal 881, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.564472 700060 task_exit.go:204] [ 881: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.564480 700060 task_exit.go:204] [ 881: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.564486 700060 task_exit.go:204] [ 881: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.564505 700060 task_signals.go:204] [ 881: 884] Signal 881, PID: 884, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.564530 700060 task_exit.go:204] [ 881: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.564617 700060 task_exit.go:204] [ 881: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.564639 700060 task_exit.go:204] [ 881: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.564658 700060 task_signals.go:204] [ 881: 885] Signal 881, PID: 885, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.564668 700060 task_exit.go:204] [ 881: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.566006 700060 task_exit.go:204] [ 881: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.566198 700060 task_exit.go:204] [ 881: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.566237 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.566284 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.566312 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.566400 700060 task_exit.go:204] [ 881: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.567112 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.568806 700060 syscalls.go:262] [ 886: 886] Allocating stack with size of 8388608 bytes D0713 05:28:07.568921 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.569855 700060 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.569894 700060 usertrap_amd64.go:106] [ 886: 886] Map a usertrap vma at 63000 D0713 05:28:07.569954 700060 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc0021ac930 1 D0713 05:28:07.569979 700060 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:07.570281 700060 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.570298 700060 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc0021ac930 2 D0713 05:28:07.570310 700060 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:07.570745 700060 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.570779 700060 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc0021ac930 3 D0713 05:28:07.570789 700060 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:07.581032 700060 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.581083 700060 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc0021ac930 4 D0713 05:28:07.581104 700060 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:07.582632 700060 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.582667 700060 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc0021ac930 5 D0713 05:28:07.582683 700060 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:07.582795 700060 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.582816 700060 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc0021ac930 6 D0713 05:28:07.582825 700060 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:07.583402 700060 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.583433 700060 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc0021ac930 7 D0713 05:28:07.583442 700060 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:07.583691 700060 usertrap_amd64.go:212] [ 886: 887] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.583718 700060 usertrap_amd64.go:122] [ 886: 887] Allocate a new trap: 0xc0021ac930 8 D0713 05:28:07.583732 700060 usertrap_amd64.go:225] [ 886: 887] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:07.583978 700060 usertrap_amd64.go:212] [ 886: 887] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.584005 700060 usertrap_amd64.go:122] [ 886: 887] Allocate a new trap: 0xc0021ac930 9 D0713 05:28:07.584018 700060 usertrap_amd64.go:225] [ 886: 887] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:07.584152 700060 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.584188 700060 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc0021ac930 10 D0713 05:28:07.584198 700060 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:07.593311 700060 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.593342 700060 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc0021ac930 11 D0713 05:28:07.593352 700060 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:07.595780 700060 usertrap_amd64.go:212] [ 886: 887] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.595804 700060 usertrap_amd64.go:122] [ 886: 887] Allocate a new trap: 0xc0021ac930 12 D0713 05:28:07.595818 700060 usertrap_amd64.go:225] [ 886: 887] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:07.595910 700060 usertrap_amd64.go:212] [ 886: 887] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.595920 700060 usertrap_amd64.go:122] [ 886: 887] Allocate a new trap: 0xc0021ac930 13 D0713 05:28:07.595930 700060 usertrap_amd64.go:225] [ 886: 887] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:07.595973 700060 task_signals.go:470] [ 886: 886] Notified of signal 23 D0713 05:28:07.596099 700060 task_signals.go:220] [ 886: 886] Signal 23: delivering to handler D0713 05:28:07.604105 700060 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.604168 700060 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc0021ac930 14 D0713 05:28:07.604190 700060 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:07.604305 700060 task_exit.go:204] [ 886: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.604351 700060 task_exit.go:204] [ 886: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.604380 700060 task_signals.go:204] [ 886: 888] Signal 886, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.604409 700060 task_signals.go:204] [ 886: 889] Signal 886, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.604431 700060 task_exit.go:204] [ 886: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.604406 700060 task_signals.go:204] [ 886: 887] Signal 886, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.604453 700060 task_signals.go:204] [ 886: 890] Signal 886, PID: 890, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.604464 700060 task_exit.go:204] [ 886: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.604500 700060 task_exit.go:204] [ 886: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.604554 700060 task_exit.go:204] [ 886: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.604589 700060 task_exit.go:204] [ 886: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.604597 700060 task_exit.go:204] [ 886: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.604618 700060 task_exit.go:204] [ 886: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.604639 700060 task_exit.go:204] [ 886: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.604646 700060 task_exit.go:204] [ 886: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.604659 700060 task_exit.go:204] [ 886: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.605896 700060 task_exit.go:204] [ 886: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.605956 700060 task_exit.go:204] [ 886: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.605978 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.606054 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.606075 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.606271 700060 task_exit.go:204] [ 886: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.607104 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.608692 700060 syscalls.go:262] [ 891: 891] Allocating stack with size of 8388608 bytes D0713 05:28:07.608789 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.610558 700060 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.610627 700060 usertrap_amd64.go:106] [ 891: 891] Map a usertrap vma at 64000 D0713 05:28:07.610755 700060 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0021acba0 1 D0713 05:28:07.610792 700060 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:07.611481 700060 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.611511 700060 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0021acba0 2 D0713 05:28:07.611525 700060 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:07.612259 700060 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.612314 700060 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0021acba0 3 D0713 05:28:07.612331 700060 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:07.621075 700060 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.621137 700060 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0021acba0 4 D0713 05:28:07.621161 700060 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:07.622616 700060 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.622644 700060 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0021acba0 5 D0713 05:28:07.622658 700060 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:07.622747 700060 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.622760 700060 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0021acba0 6 D0713 05:28:07.622765 700060 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:07.623324 700060 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.623348 700060 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0021acba0 7 D0713 05:28:07.623361 700060 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:07.623548 700060 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.623580 700060 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc0021acba0 8 D0713 05:28:07.623593 700060 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:07.623710 700060 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.623734 700060 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc0021acba0 9 D0713 05:28:07.623745 700060 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:07.623876 700060 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.623905 700060 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0021acba0 10 D0713 05:28:07.623916 700060 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:07.630807 700060 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.630835 700060 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0021acba0 11 D0713 05:28:07.630845 700060 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:07.634460 700060 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.634486 700060 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc0021acba0 12 D0713 05:28:07.634495 700060 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:07.634537 700060 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.634542 700060 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc0021acba0 13 D0713 05:28:07.634547 700060 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:07.634559 700060 task_signals.go:470] [ 891: 891] Notified of signal 23 D0713 05:28:07.634613 700060 task_signals.go:220] [ 891: 891] Signal 23: delivering to handler D0713 05:28:07.640161 700060 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.640184 700060 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc0021acba0 14 D0713 05:28:07.640194 700060 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:07.640212 700060 task_exit.go:204] [ 891: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.640238 700060 task_exit.go:204] [ 891: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.640261 700060 task_signals.go:204] [ 891: 892] Signal 891, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.640286 700060 task_exit.go:204] [ 891: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.640280 700060 task_signals.go:204] [ 891: 894] Signal 891, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.640292 700060 task_exit.go:204] [ 891: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.640295 700060 task_exit.go:204] [ 891: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.640302 700060 task_signals.go:204] [ 891: 893] Signal 891, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.640313 700060 task_signals.go:204] [ 891: 895] Signal 891, PID: 895, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.640314 700060 task_exit.go:204] [ 891: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.640324 700060 task_exit.go:204] [ 891: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.640340 700060 task_exit.go:204] [ 891: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.640343 700060 task_exit.go:204] [ 891: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.640350 700060 task_exit.go:204] [ 891: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.640408 700060 task_exit.go:204] [ 891: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.640434 700060 task_exit.go:204] [ 891: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.641381 700060 task_exit.go:204] [ 891: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.641409 700060 task_exit.go:204] [ 891: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.641421 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.641460 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.641485 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.641615 700060 task_exit.go:204] [ 891: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.642292 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.644544 700060 syscalls.go:262] [ 896: 896] Allocating stack with size of 8388608 bytes D0713 05:28:07.644755 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.645793 700060 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.645832 700060 usertrap_amd64.go:106] [ 896: 896] Map a usertrap vma at 65000 D0713 05:28:07.645908 700060 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc0021accf0 1 D0713 05:28:07.645938 700060 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:07.646112 700060 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.646130 700060 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc0021accf0 2 D0713 05:28:07.646138 700060 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:07.646673 700060 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.646697 700060 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc0021accf0 3 D0713 05:28:07.646708 700060 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:07.651818 700060 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.651844 700060 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc0021accf0 4 D0713 05:28:07.651853 700060 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:07.652852 700060 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.652876 700060 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc0021accf0 5 D0713 05:28:07.652884 700060 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:07.653040 700060 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.653064 700060 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc0021accf0 6 D0713 05:28:07.653077 700060 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:07.653656 700060 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.653680 700060 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc0021accf0 7 D0713 05:28:07.653691 700060 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:07.653833 700060 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.653852 700060 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc0021accf0 8 D0713 05:28:07.653861 700060 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:07.654032 700060 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.654053 700060 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc0021accf0 9 D0713 05:28:07.654062 700060 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:07.654160 700060 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.654179 700060 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc0021accf0 10 D0713 05:28:07.654191 700060 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:07.660245 700060 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.660268 700060 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc0021accf0 11 D0713 05:28:07.660276 700060 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:07.664500 700060 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.664524 700060 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc0021accf0 12 D0713 05:28:07.664532 700060 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:07.664584 700060 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.664592 700060 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc0021accf0 13 D0713 05:28:07.664605 700060 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:07.664652 700060 task_signals.go:470] [ 896: 896] Notified of signal 23 D0713 05:28:07.664727 700060 task_signals.go:220] [ 896: 896] Signal 23: delivering to handler D0713 05:28:07.670423 700060 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.670449 700060 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc0021accf0 14 D0713 05:28:07.670458 700060 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:07.670499 700060 task_exit.go:204] [ 896: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.670511 700060 task_exit.go:204] [ 896: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.670526 700060 task_signals.go:204] [ 896: 897] Signal 896, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.670559 700060 task_signals.go:204] [ 896: 900] Signal 896, PID: 900, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.670571 700060 task_exit.go:204] [ 896: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.670579 700060 task_exit.go:204] [ 896: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.670585 700060 task_exit.go:204] [ 896: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.670569 700060 task_signals.go:204] [ 896: 899] Signal 896, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.670602 700060 task_exit.go:204] [ 896: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.670643 700060 task_signals.go:204] [ 896: 898] Signal 896, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.670675 700060 task_exit.go:204] [ 896: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.670697 700060 task_exit.go:204] [ 896: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.670714 700060 task_exit.go:204] [ 896: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.670734 700060 task_exit.go:204] [ 896: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.670741 700060 task_exit.go:204] [ 896: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.670755 700060 task_exit.go:204] [ 896: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.671712 700060 task_exit.go:204] [ 896: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.671739 700060 task_exit.go:204] [ 896: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.671751 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.672002 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.672045 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.672176 700060 task_exit.go:204] [ 896: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.672745 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.674159 700060 syscalls.go:262] [ 901: 901] Allocating stack with size of 8388608 bytes D0713 05:28:07.674395 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.675294 700060 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.675345 700060 usertrap_amd64.go:106] [ 901: 901] Map a usertrap vma at 69000 D0713 05:28:07.675444 700060 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0022b5aa0 1 D0713 05:28:07.675476 700060 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:07.675917 700060 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.675946 700060 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0022b5aa0 2 D0713 05:28:07.675958 700060 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:07.676578 700060 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.676605 700060 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0022b5aa0 3 D0713 05:28:07.676615 700060 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:07.683735 700060 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.683763 700060 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0022b5aa0 4 D0713 05:28:07.683775 700060 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:07.685023 700060 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.685053 700060 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0022b5aa0 5 D0713 05:28:07.685066 700060 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:07.685277 700060 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.685301 700060 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0022b5aa0 6 D0713 05:28:07.685315 700060 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:07.685731 700060 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.685753 700060 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0022b5aa0 7 D0713 05:28:07.685764 700060 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:07.685922 700060 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.685947 700060 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc0022b5aa0 8 D0713 05:28:07.685959 700060 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:07.686147 700060 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.686162 700060 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc0022b5aa0 9 D0713 05:28:07.686170 700060 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:07.686193 700060 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.686200 700060 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0022b5aa0 10 D0713 05:28:07.686206 700060 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:07.689462 700060 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.689490 700060 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc0022b5aa0 11 D0713 05:28:07.689502 700060 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:07.689558 700060 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.689578 700060 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc0022b5aa0 12 D0713 05:28:07.689586 700060 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:07.689651 700060 task_signals.go:470] [ 901: 901] Notified of signal 23 D0713 05:28:07.689711 700060 task_signals.go:220] [ 901: 901] Signal 23: delivering to handler D0713 05:28:07.697450 700060 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.697527 700060 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0022b5aa0 13 D0713 05:28:07.697545 700060 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:07.702024 700060 task_signals.go:470] [ 901: 901] Notified of signal 23 D0713 05:28:07.702101 700060 task_signals.go:220] [ 901: 901] Signal 23: delivering to handler D0713 05:28:07.710863 700060 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.710912 700060 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0022b5aa0 14 D0713 05:28:07.710934 700060 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:07.711010 700060 task_exit.go:204] [ 901: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.711092 700060 task_exit.go:204] [ 901: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.711139 700060 task_signals.go:204] [ 901: 903] Signal 901, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.711164 700060 task_exit.go:204] [ 901: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.711171 700060 task_exit.go:204] [ 901: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.711176 700060 task_exit.go:204] [ 901: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.711192 700060 task_signals.go:204] [ 901: 902] Signal 901, PID: 902, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.711217 700060 task_exit.go:204] [ 901: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.711224 700060 task_exit.go:204] [ 901: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.711228 700060 task_exit.go:204] [ 901: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.711241 700060 task_signals.go:204] [ 901: 904] Signal 901, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.711249 700060 task_exit.go:204] [ 901: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.711254 700060 task_exit.go:204] [ 901: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.711258 700060 task_exit.go:204] [ 901: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.711278 700060 task_signals.go:204] [ 901: 905] Signal 901, PID: 905, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.711286 700060 task_exit.go:204] [ 901: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.712635 700060 task_exit.go:204] [ 901: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.712793 700060 task_exit.go:204] [ 901: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.712871 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.712933 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.713010 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.713189 700060 task_exit.go:204] [ 901: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.714117 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.715571 700060 syscalls.go:262] [ 906: 906] Allocating stack with size of 8388608 bytes D0713 05:28:07.715721 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.717070 700060 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.717112 700060 usertrap_amd64.go:106] [ 906: 906] Map a usertrap vma at 69000 D0713 05:28:07.717180 700060 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc0004a3dd0 1 D0713 05:28:07.717206 700060 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:07.717420 700060 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.717480 700060 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc0004a3dd0 2 D0713 05:28:07.717495 700060 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:07.718042 700060 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.718067 700060 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc0004a3dd0 3 D0713 05:28:07.718077 700060 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:07.723908 700060 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.723931 700060 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc0004a3dd0 4 D0713 05:28:07.723940 700060 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:07.725196 700060 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.725225 700060 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc0004a3dd0 5 D0713 05:28:07.725236 700060 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:07.725271 700060 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.725277 700060 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc0004a3dd0 6 D0713 05:28:07.725283 700060 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:07.725442 700060 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.725448 700060 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc0004a3dd0 7 D0713 05:28:07.725455 700060 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:07.725576 700060 usertrap_amd64.go:212] [ 906: 907] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.725588 700060 usertrap_amd64.go:122] [ 906: 907] Allocate a new trap: 0xc0004a3dd0 8 D0713 05:28:07.725597 700060 usertrap_amd64.go:225] [ 906: 907] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:07.726013 700060 usertrap_amd64.go:212] [ 906: 907] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.726045 700060 usertrap_amd64.go:122] [ 906: 907] Allocate a new trap: 0xc0004a3dd0 9 D0713 05:28:07.726054 700060 usertrap_amd64.go:225] [ 906: 907] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:07.726228 700060 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.726260 700060 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc0004a3dd0 10 D0713 05:28:07.726291 700060 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:07.726951 700060 usertrap_amd64.go:212] [ 906: 907] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.727019 700060 usertrap_amd64.go:122] [ 906: 907] Allocate a new trap: 0xc0004a3dd0 11 D0713 05:28:07.727066 700060 usertrap_amd64.go:225] [ 906: 907] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:07.727122 700060 usertrap_amd64.go:212] [ 906: 907] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.727158 700060 usertrap_amd64.go:122] [ 906: 907] Allocate a new trap: 0xc0004a3dd0 12 D0713 05:28:07.727170 700060 usertrap_amd64.go:225] [ 906: 907] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:07.727199 700060 task_signals.go:470] [ 906: 906] Notified of signal 23 D0713 05:28:07.727243 700060 task_signals.go:220] [ 906: 906] Signal 23: delivering to handler D0713 05:28:07.737290 700060 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.737334 700060 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc0004a3dd0 13 D0713 05:28:07.737350 700060 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:07.742023 700060 task_signals.go:470] [ 906: 906] Notified of signal 23 D0713 05:28:07.742226 700060 task_signals.go:220] [ 906: 906] Signal 23: delivering to handler D0713 05:28:07.752619 700060 task_signals.go:470] [ 906: 906] Notified of signal 23 D0713 05:28:07.752890 700060 task_signals.go:220] [ 906: 906] Signal 23: delivering to handler D0713 05:28:07.756319 700060 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.756362 700060 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc0004a3dd0 14 D0713 05:28:07.756380 700060 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:07.756461 700060 task_exit.go:204] [ 906: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.756485 700060 task_exit.go:204] [ 906: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.756533 700060 task_signals.go:204] [ 906: 909] Signal 906, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.756551 700060 task_exit.go:204] [ 906: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.756531 700060 task_signals.go:204] [ 906: 908] Signal 906, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.756558 700060 task_exit.go:204] [ 906: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.756583 700060 task_exit.go:204] [ 906: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.756624 700060 task_signals.go:204] [ 906: 910] Signal 906, PID: 910, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.756668 700060 task_exit.go:204] [ 906: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.756662 700060 task_signals.go:204] [ 906: 907] Signal 906, PID: 907, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.756686 700060 task_exit.go:204] [ 906: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.756836 700060 task_exit.go:204] [ 906: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.756863 700060 task_exit.go:204] [ 906: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.756898 700060 task_exit.go:204] [ 906: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.756929 700060 task_exit.go:204] [ 906: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.757007 700060 task_exit.go:204] [ 906: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.758521 700060 task_exit.go:204] [ 906: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.758567 700060 task_exit.go:204] [ 906: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.758591 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.758641 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.758667 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.758832 700060 task_exit.go:204] [ 906: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.759906 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.761950 700060 syscalls.go:262] [ 911: 911] Allocating stack with size of 8388608 bytes D0713 05:28:07.762139 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.764286 700060 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.764364 700060 usertrap_amd64.go:106] [ 911: 911] Map a usertrap vma at 60000 D0713 05:28:07.764475 700060 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0021ad320 1 D0713 05:28:07.764583 700060 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:07.765280 700060 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.765310 700060 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0021ad320 2 D0713 05:28:07.765338 700060 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:07.765956 700060 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.765986 700060 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0021ad320 3 D0713 05:28:07.766002 700060 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:07.773512 700060 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.773577 700060 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0021ad320 4 D0713 05:28:07.773598 700060 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:07.775074 700060 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.775124 700060 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0021ad320 5 D0713 05:28:07.775144 700060 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:07.775217 700060 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.775227 700060 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0021ad320 6 D0713 05:28:07.775235 700060 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:07.775474 700060 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.775498 700060 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0021ad320 7 D0713 05:28:07.775508 700060 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:07.775725 700060 usertrap_amd64.go:212] [ 911: 912] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.775748 700060 usertrap_amd64.go:122] [ 911: 912] Allocate a new trap: 0xc0021ad320 8 D0713 05:28:07.775760 700060 usertrap_amd64.go:225] [ 911: 912] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:07.776123 700060 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.776152 700060 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0021ad320 9 D0713 05:28:07.776167 700060 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:07.776194 700060 usertrap_amd64.go:212] [ 911: 912] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.776219 700060 usertrap_amd64.go:122] [ 911: 912] Allocate a new trap: 0xc0021ad320 10 D0713 05:28:07.776319 700060 usertrap_amd64.go:225] [ 911: 912] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:07.785892 700060 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.785932 700060 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0021ad320 11 D0713 05:28:07.785949 700060 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:07.788647 700060 usertrap_amd64.go:212] [ 911: 912] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.788685 700060 usertrap_amd64.go:122] [ 911: 912] Allocate a new trap: 0xc0021ad320 12 D0713 05:28:07.788701 700060 usertrap_amd64.go:225] [ 911: 912] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:07.788773 700060 usertrap_amd64.go:212] [ 911: 912] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.788801 700060 usertrap_amd64.go:122] [ 911: 912] Allocate a new trap: 0xc0021ad320 13 D0713 05:28:07.788814 700060 usertrap_amd64.go:225] [ 911: 912] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:07.788868 700060 task_signals.go:470] [ 911: 911] Notified of signal 23 D0713 05:28:07.788976 700060 task_signals.go:220] [ 911: 911] Signal 23: delivering to handler D0713 05:28:07.797587 700060 usertrap_amd64.go:212] [ 911: 911] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.797629 700060 usertrap_amd64.go:122] [ 911: 911] Allocate a new trap: 0xc0021ad320 14 D0713 05:28:07.797646 700060 usertrap_amd64.go:225] [ 911: 911] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:07.797736 700060 task_exit.go:204] [ 911: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.797767 700060 task_exit.go:204] [ 911: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.797804 700060 task_signals.go:204] [ 911: 912] Signal 911, PID: 912, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.797826 700060 task_exit.go:204] [ 911: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.797833 700060 task_exit.go:204] [ 911: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.797837 700060 task_exit.go:204] [ 911: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.797856 700060 task_signals.go:204] [ 911: 913] Signal 911, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.797865 700060 task_exit.go:204] [ 911: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.797871 700060 task_exit.go:204] [ 911: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.797875 700060 task_exit.go:204] [ 911: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.797890 700060 task_signals.go:204] [ 911: 914] Signal 911, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.797901 700060 task_exit.go:204] [ 911: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.797896 700060 task_signals.go:204] [ 911: 915] Signal 911, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.797915 700060 task_signals.go:204] [ 911: 916] Signal 911, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.797926 700060 task_exit.go:204] [ 911: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.797930 700060 task_exit.go:204] [ 911: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.797939 700060 task_exit.go:204] [ 911: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.797945 700060 task_exit.go:204] [ 911: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.797949 700060 task_exit.go:204] [ 911: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.797958 700060 task_exit.go:204] [ 911: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.799553 700060 task_exit.go:204] [ 911: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.799668 700060 task_exit.go:204] [ 911: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.799753 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.799802 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.799815 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.799964 700060 task_exit.go:204] [ 911: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.800802 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.802652 700060 syscalls.go:262] [ 917: 917] Allocating stack with size of 8388608 bytes D0713 05:28:07.802815 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.805874 700060 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.805922 700060 usertrap_amd64.go:106] [ 917: 917] Map a usertrap vma at 62000 D0713 05:28:07.806050 700060 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0004cfc20 1 D0713 05:28:07.806103 700060 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:07.806752 700060 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.806771 700060 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0004cfc20 2 D0713 05:28:07.806786 700060 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:07.807500 700060 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.807523 700060 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0004cfc20 3 D0713 05:28:07.807543 700060 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:07.813989 700060 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.814033 700060 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0004cfc20 4 D0713 05:28:07.814050 700060 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:07.816522 700060 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.816572 700060 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0004cfc20 5 D0713 05:28:07.816606 700060 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:07.817610 700060 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.817648 700060 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0004cfc20 6 D0713 05:28:07.817670 700060 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:07.818323 700060 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.818356 700060 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0004cfc20 7 D0713 05:28:07.818375 700060 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:07.818631 700060 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.818666 700060 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc0004cfc20 8 D0713 05:28:07.818686 700060 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:07.818995 700060 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.819016 700060 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc0004cfc20 9 D0713 05:28:07.819030 700060 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:07.819059 700060 usertrap_amd64.go:212] [ 917: 919] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:07.819088 700060 usertrap_amd64.go:122] [ 917: 919] Allocate a new trap: 0xc0004cfc20 10 D0713 05:28:07.819101 700060 usertrap_amd64.go:225] [ 917: 919] Apply the binary patch addr 46b6e0 trap addr 62320 ([184 24 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:07.819157 700060 usertrap_amd64.go:212] [ 917: 919] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.819196 700060 usertrap_amd64.go:122] [ 917: 919] Allocate a new trap: 0xc0004cfc20 11 D0713 05:28:07.819210 700060 usertrap_amd64.go:225] [ 917: 919] Apply the binary patch addr 46b57c trap addr 62370 ([184 202 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:07.827685 700060 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.827740 700060 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0004cfc20 12 D0713 05:28:07.827754 700060 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:07.830263 700060 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.830329 700060 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc0004cfc20 13 D0713 05:28:07.830348 700060 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:07.830646 700060 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.830679 700060 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc0004cfc20 14 D0713 05:28:07.830695 700060 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:07.830754 700060 task_signals.go:470] [ 917: 917] Notified of signal 23 D0713 05:28:07.830869 700060 task_signals.go:220] [ 917: 917] Signal 23: delivering to handler D0713 05:28:07.841542 700060 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.841606 700060 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0004cfc20 15 D0713 05:28:07.841629 700060 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 05:28:07.841668 700060 task_signals.go:470] [ 917: 917] Notified of signal 23 D0713 05:28:07.841694 700060 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.841725 700060 task_signals.go:204] [ 917: 921] Signal 917, PID: 921, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.841766 700060 task_signals.go:204] [ 917: 918] Signal 917, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.841783 700060 task_signals.go:204] [ 917: 920] Signal 917, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.841817 700060 task_signals.go:204] [ 917: 919] Signal 917, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.841827 700060 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.841843 700060 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.841860 700060 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.841865 700060 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.841877 700060 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.841893 700060 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.841899 700060 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.841907 700060 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.841923 700060 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.841930 700060 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.841939 700060 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.843317 700060 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.843354 700060 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.843373 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.843508 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.843545 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.843628 700060 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.843746 700060 task_signals.go:470] [ 5: 19] Notified of signal 23 D0713 05:28:07.843897 700060 task_signals.go:220] [ 5: 19] Signal 23: delivering to handler D0713 05:28:07.844590 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.846450 700060 syscalls.go:262] [ 922: 922] Allocating stack with size of 8388608 bytes D0713 05:28:07.846653 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.848969 700060 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.849027 700060 usertrap_amd64.go:106] [ 922: 922] Map a usertrap vma at 62000 D0713 05:28:07.849328 700060 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001c48450 1 D0713 05:28:07.849396 700060 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:07.849937 700060 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.849965 700060 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001c48450 2 D0713 05:28:07.849994 700060 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:07.851294 700060 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.851325 700060 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001c48450 3 D0713 05:28:07.851341 700060 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:07.858390 700060 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.858431 700060 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001c48450 4 D0713 05:28:07.858448 700060 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:07.860012 700060 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.860053 700060 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001c48450 5 D0713 05:28:07.860070 700060 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:07.860147 700060 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.860153 700060 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001c48450 6 D0713 05:28:07.860160 700060 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:07.860602 700060 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.860618 700060 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001c48450 7 D0713 05:28:07.860626 700060 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:07.860806 700060 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.860835 700060 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc001c48450 8 D0713 05:28:07.860846 700060 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:07.861100 700060 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.861125 700060 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc001c48450 9 D0713 05:28:07.861144 700060 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:07.861313 700060 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.861328 700060 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001c48450 10 D0713 05:28:07.861338 700060 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:07.861498 700060 usertrap_amd64.go:212] [ 922: 925] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:07.861521 700060 usertrap_amd64.go:122] [ 922: 925] Allocate a new trap: 0xc001c48450 11 D0713 05:28:07.861536 700060 usertrap_amd64.go:225] [ 922: 925] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:07.870085 700060 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.870169 700060 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001c48450 12 D0713 05:28:07.870192 700060 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:07.873467 700060 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.873502 700060 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc001c48450 13 D0713 05:28:07.873520 700060 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:07.873598 700060 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.873616 700060 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc001c48450 14 D0713 05:28:07.873627 700060 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:07.873803 700060 task_signals.go:470] [ 922: 922] Notified of signal 23 D0713 05:28:07.873934 700060 task_signals.go:220] [ 922: 922] Signal 23: delivering to handler D0713 05:28:07.884118 700060 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.884174 700060 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001c48450 15 D0713 05:28:07.884195 700060 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 05:28:07.884327 700060 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.884405 700060 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.884404 700060 task_signals.go:204] [ 922: 925] Signal 922, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.884434 700060 task_signals.go:204] [ 922: 923] Signal 922, PID: 923, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.884437 700060 task_signals.go:204] [ 922: 926] Signal 922, PID: 926, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.884451 700060 task_signals.go:204] [ 922: 924] Signal 922, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.884465 700060 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.884499 700060 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.884516 700060 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.884444 700060 task_signals.go:204] [ 922: 927] Signal 922, PID: 927, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.884569 700060 task_exit.go:204] [ 922: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.884586 700060 task_exit.go:204] [ 922: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.884593 700060 task_exit.go:204] [ 922: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.884607 700060 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.884625 700060 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.884631 700060 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.884649 700060 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.884667 700060 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.884674 700060 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.884694 700060 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.886170 700060 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.886204 700060 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.886223 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.886264 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.886286 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.886516 700060 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.887509 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.889295 700060 syscalls.go:262] [ 928: 928] Allocating stack with size of 8388608 bytes D0713 05:28:07.889402 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.890485 700060 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.890520 700060 usertrap_amd64.go:106] [ 928: 928] Map a usertrap vma at 63000 D0713 05:28:07.890636 700060 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000da3f20 1 D0713 05:28:07.890657 700060 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:07.891101 700060 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.891139 700060 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000da3f20 2 D0713 05:28:07.891163 700060 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:07.891806 700060 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.891836 700060 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000da3f20 3 D0713 05:28:07.891850 700060 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:07.899017 700060 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.899050 700060 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000da3f20 4 D0713 05:28:07.899062 700060 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:07.900235 700060 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.900272 700060 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000da3f20 5 D0713 05:28:07.900290 700060 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:07.902852 700060 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.902878 700060 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000da3f20 6 D0713 05:28:07.902888 700060 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:07.903196 700060 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.903212 700060 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000da3f20 7 D0713 05:28:07.903220 700060 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:07.903373 700060 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.903396 700060 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc000da3f20 8 D0713 05:28:07.903407 700060 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:07.903575 700060 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.903592 700060 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc000da3f20 9 D0713 05:28:07.903601 700060 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:07.903685 700060 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.903711 700060 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000da3f20 10 D0713 05:28:07.903722 700060 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:07.911369 700060 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.911402 700060 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000da3f20 11 D0713 05:28:07.911414 700060 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:07.914213 700060 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.914250 700060 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc000da3f20 12 D0713 05:28:07.914271 700060 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:07.914352 700060 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.914383 700060 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc000da3f20 13 D0713 05:28:07.914397 700060 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:07.914450 700060 task_signals.go:470] [ 928: 928] Notified of signal 23 D0713 05:28:07.914502 700060 task_signals.go:220] [ 928: 928] Signal 23: delivering to handler D0713 05:28:07.923210 700060 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.923256 700060 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000da3f20 14 D0713 05:28:07.923275 700060 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:07.923370 700060 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.923412 700060 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.923414 700060 task_signals.go:204] [ 928: 929] Signal 928, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.923450 700060 task_signals.go:204] [ 928: 932] Signal 928, PID: 932, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.923458 700060 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.923430 700060 task_signals.go:204] [ 928: 931] Signal 928, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.923461 700060 task_signals.go:204] [ 928: 930] Signal 928, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.923476 700060 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.923503 700060 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.923525 700060 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.923546 700060 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.923566 700060 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.923573 700060 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.923586 700060 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.923598 700060 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.923604 700060 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.924758 700060 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.924792 700060 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.924840 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.924879 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.924890 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.925144 700060 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.926268 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.927795 700060 syscalls.go:262] [ 933: 933] Allocating stack with size of 8388608 bytes D0713 05:28:07.927891 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.929174 700060 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.929208 700060 usertrap_amd64.go:106] [ 933: 933] Map a usertrap vma at 62000 D0713 05:28:07.929292 700060 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0012a4120 1 D0713 05:28:07.929308 700060 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:07.929542 700060 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.929557 700060 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0012a4120 2 D0713 05:28:07.929563 700060 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:07.930152 700060 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.930174 700060 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0012a4120 3 D0713 05:28:07.930185 700060 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:07.936178 700060 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.936205 700060 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0012a4120 4 D0713 05:28:07.936216 700060 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:07.937339 700060 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.937366 700060 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0012a4120 5 D0713 05:28:07.937382 700060 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:07.937434 700060 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.937453 700060 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0012a4120 6 D0713 05:28:07.937464 700060 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:07.937713 700060 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.937731 700060 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0012a4120 7 D0713 05:28:07.937740 700060 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:07.937884 700060 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.937916 700060 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc0012a4120 8 D0713 05:28:07.937930 700060 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:07.938154 700060 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.938179 700060 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc0012a4120 9 D0713 05:28:07.938189 700060 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:07.938239 700060 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.938253 700060 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0012a4120 10 D0713 05:28:07.938260 700060 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:07.946882 700060 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.946932 700060 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0012a4120 11 D0713 05:28:07.946952 700060 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:07.949359 700060 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.949390 700060 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc0012a4120 12 D0713 05:28:07.949408 700060 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:07.949442 700060 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.949451 700060 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc0012a4120 13 D0713 05:28:07.949460 700060 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:07.949489 700060 task_signals.go:470] [ 933: 933] Notified of signal 23 D0713 05:28:07.949613 700060 task_signals.go:220] [ 933: 933] Signal 23: delivering to handler D0713 05:28:07.958146 700060 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.958178 700060 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0012a4120 14 D0713 05:28:07.958189 700060 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:07.958267 700060 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.958298 700060 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.958326 700060 task_signals.go:204] [ 933: 936] Signal 933, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.958356 700060 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.958367 700060 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.958377 700060 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.958397 700060 task_signals.go:204] [ 933: 937] Signal 933, PID: 937, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.958371 700060 task_signals.go:204] [ 933: 935] Signal 933, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.958430 700060 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.958441 700060 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.958449 700060 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.958396 700060 task_signals.go:204] [ 933: 934] Signal 933, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.958477 700060 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.958482 700060 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.958486 700060 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.958496 700060 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.960108 700060 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.960148 700060 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.960167 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.960239 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.960316 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.960421 700060 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.961418 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.963132 700060 syscalls.go:262] [ 938: 938] Allocating stack with size of 8388608 bytes D0713 05:28:07.963277 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.966585 700060 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.966640 700060 usertrap_amd64.go:106] [ 938: 938] Map a usertrap vma at 69000 D0713 05:28:07.966733 700060 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0021ad8c0 1 D0713 05:28:07.966760 700060 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:07.967276 700060 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.967288 700060 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0021ad8c0 2 D0713 05:28:07.967299 700060 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:07.968003 700060 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.968032 700060 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0021ad8c0 3 D0713 05:28:07.968044 700060 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:07.975907 700060 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.975941 700060 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0021ad8c0 4 D0713 05:28:07.975953 700060 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:07.977419 700060 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.977452 700060 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0021ad8c0 5 D0713 05:28:07.977464 700060 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:07.977533 700060 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.977550 700060 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0021ad8c0 6 D0713 05:28:07.977559 700060 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:07.978166 700060 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.978193 700060 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0021ad8c0 7 D0713 05:28:07.978205 700060 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:07.978426 700060 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.978450 700060 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc0021ad8c0 8 D0713 05:28:07.978459 700060 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:07.978659 700060 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.978683 700060 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc0021ad8c0 9 D0713 05:28:07.978694 700060 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:07.978954 700060 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.978978 700060 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0021ad8c0 10 D0713 05:28:07.978989 700060 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:07.979160 700060 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.979235 700060 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc0021ad8c0 11 D0713 05:28:07.979252 700060 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:07.979323 700060 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.979338 700060 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc0021ad8c0 12 D0713 05:28:07.979347 700060 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:07.979374 700060 task_signals.go:470] [ 938: 941] Notified of signal 23 D0713 05:28:07.979399 700060 task_signals.go:220] [ 938: 941] Signal 23: delivering to handler D0713 05:28:07.987284 700060 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.987318 700060 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0021ad8c0 13 D0713 05:28:07.987331 700060 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:07.989999 700060 task_signals.go:470] [ 938: 938] Notified of signal 23 D0713 05:28:07.990032 700060 task_signals.go:220] [ 938: 938] Signal 23: delivering to handler D0713 05:28:07.998227 700060 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.998250 700060 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc0021ad8c0 14 D0713 05:28:07.998264 700060 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:07.998303 700060 task_exit.go:204] [ 938: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.998324 700060 task_exit.go:204] [ 938: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.998347 700060 task_signals.go:204] [ 938: 941] Signal 938, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.998361 700060 task_exit.go:204] [ 938: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.998351 700060 task_signals.go:204] [ 938: 940] Signal 938, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.998368 700060 task_exit.go:204] [ 938: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.998394 700060 task_exit.go:204] [ 938: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.998437 700060 task_signals.go:204] [ 938: 939] Signal 938, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.998447 700060 task_exit.go:204] [ 938: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.998453 700060 task_exit.go:204] [ 938: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.998459 700060 task_exit.go:204] [ 938: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.998449 700060 task_signals.go:204] [ 938: 942] Signal 938, PID: 942, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.998468 700060 task_exit.go:204] [ 938: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.998487 700060 task_exit.go:204] [ 938: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.998497 700060 task_exit.go:204] [ 938: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.998511 700060 task_exit.go:204] [ 938: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.999642 700060 task_exit.go:204] [ 938: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.999678 700060 task_exit.go:204] [ 938: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.999693 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:07.999763 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.999784 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:07.999942 700060 task_exit.go:204] [ 938: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.000583 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.002066 700060 syscalls.go:262] [ 943: 943] Allocating stack with size of 8388608 bytes D0713 05:28:08.002176 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.003262 700060 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.003302 700060 usertrap_amd64.go:106] [ 943: 943] Map a usertrap vma at 69000 D0713 05:28:08.003378 700060 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0012a4420 1 D0713 05:28:08.003397 700060 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:08.003781 700060 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.003803 700060 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0012a4420 2 D0713 05:28:08.003814 700060 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:08.004434 700060 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.004461 700060 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0012a4420 3 D0713 05:28:08.004474 700060 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:08.010967 700060 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.010993 700060 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0012a4420 4 D0713 05:28:08.011009 700060 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:08.012348 700060 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.012399 700060 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0012a4420 5 D0713 05:28:08.012413 700060 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:08.012493 700060 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.012507 700060 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0012a4420 6 D0713 05:28:08.012514 700060 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:08.013055 700060 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.013080 700060 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0012a4420 7 D0713 05:28:08.013090 700060 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:08.013274 700060 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.013289 700060 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc0012a4420 8 D0713 05:28:08.013299 700060 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:08.013587 700060 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.013614 700060 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc0012a4420 9 D0713 05:28:08.013628 700060 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:08.013758 700060 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.013784 700060 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0012a4420 10 D0713 05:28:08.013799 700060 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:08.023731 700060 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.023769 700060 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0012a4420 11 D0713 05:28:08.023784 700060 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:08.024189 700060 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.024216 700060 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc0012a4420 12 D0713 05:28:08.024226 700060 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:08.024301 700060 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.024327 700060 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc0012a4420 13 D0713 05:28:08.024336 700060 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:08.024376 700060 task_signals.go:470] [ 943: 943] Notified of signal 23 D0713 05:28:08.024418 700060 task_signals.go:220] [ 943: 943] Signal 23: delivering to handler D0713 05:28:08.035961 700060 task_signals.go:470] [ 943: 943] Notified of signal 23 D0713 05:28:08.036128 700060 task_signals.go:220] [ 943: 943] Signal 23: delivering to handler I0713 05:28:08.039623 700060 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0713 05:28:08.039803 700060 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.039826 700060 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc0012a4420 14 D0713 05:28:08.039844 700060 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:08.040596 700060 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.040639 700060 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.040660 700060 task_signals.go:204] [ 943: 944] Signal 943, PID: 944, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.040676 700060 task_signals.go:204] [ 943: 947] Signal 943, PID: 947, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.040676 700060 task_signals.go:204] [ 943: 946] Signal 943, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.040705 700060 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.040753 700060 task_signals.go:204] [ 943: 945] Signal 943, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.040773 700060 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.040813 700060 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.040838 700060 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.040854 700060 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.040866 700060 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.040870 700060 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.040878 700060 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.040988 700060 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.040998 700060 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.042160 700060 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.042252 700060 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.042272 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.042303 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.042311 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.042389 700060 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.043146 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.044843 700060 syscalls.go:262] [ 948: 948] Allocating stack with size of 8388608 bytes D0713 05:28:08.045071 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.046646 700060 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.046690 700060 usertrap_amd64.go:106] [ 948: 948] Map a usertrap vma at 60000 D0713 05:28:08.046797 700060 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001c48db0 1 D0713 05:28:08.046840 700060 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:08.047166 700060 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.047234 700060 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001c48db0 2 D0713 05:28:08.047255 700060 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:08.047886 700060 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.047911 700060 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001c48db0 3 D0713 05:28:08.047926 700060 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:08.056133 700060 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.056274 700060 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001c48db0 4 D0713 05:28:08.056341 700060 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:08.057550 700060 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.057583 700060 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001c48db0 5 D0713 05:28:08.057605 700060 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:08.057664 700060 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.057689 700060 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001c48db0 6 D0713 05:28:08.057702 700060 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:08.057990 700060 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.058003 700060 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001c48db0 7 D0713 05:28:08.058017 700060 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:08.058247 700060 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.058296 700060 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc001c48db0 8 D0713 05:28:08.058308 700060 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:08.058471 700060 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.058492 700060 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc001c48db0 9 D0713 05:28:08.058502 700060 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:08.058518 700060 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.058524 700060 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001c48db0 10 D0713 05:28:08.058532 700060 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:08.066525 700060 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.066565 700060 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001c48db0 11 D0713 05:28:08.066578 700060 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:08.069196 700060 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.069226 700060 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc001c48db0 12 D0713 05:28:08.069242 700060 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:08.069282 700060 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.069301 700060 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc001c48db0 13 D0713 05:28:08.069317 700060 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:08.069358 700060 task_signals.go:470] [ 948: 948] Notified of signal 23 D0713 05:28:08.069450 700060 task_signals.go:220] [ 948: 948] Signal 23: delivering to handler D0713 05:28:08.078216 700060 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.078269 700060 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001c48db0 14 D0713 05:28:08.078289 700060 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:08.078422 700060 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.078453 700060 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.078476 700060 task_signals.go:204] [ 948: 951] Signal 948, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.078489 700060 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.078473 700060 task_signals.go:204] [ 948: 950] Signal 948, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.078495 700060 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.078579 700060 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.078543 700060 task_signals.go:204] [ 948: 949] Signal 948, PID: 949, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.078610 700060 task_signals.go:204] [ 948: 953] Signal 948, PID: 953, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.078622 700060 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.078637 700060 task_signals.go:204] [ 948: 952] Signal 948, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.078664 700060 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.078672 700060 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.078691 700060 task_exit.go:204] [ 948: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.078731 700060 task_exit.go:204] [ 948: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.078740 700060 task_exit.go:204] [ 948: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.078786 700060 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.078796 700060 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.078809 700060 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.078820 700060 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.080212 700060 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.080242 700060 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.080260 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.080309 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.080343 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.080441 700060 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.089296 700060 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.090742 700060 syscalls.go:262] [ 954: 954] Allocating stack with size of 8388608 bytes D0713 05:28:08.090880 700060 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.091176 700060 task_signals.go:470] [ 5: 9] Notified of signal 23 D0713 05:28:08.091210 700060 task_signals.go:220] [ 5: 9] Signal 23: delivering to handler D0713 05:28:08.091829 700060 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.091883 700060 usertrap_amd64.go:106] [ 954: 954] Map a usertrap vma at 62000 D0713 05:28:08.091969 700060 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0012a4cc0 1 D0713 05:28:08.092007 700060 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:08.092311 700060 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.092330 700060 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0012a4cc0 2 D0713 05:28:08.092346 700060 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:08.093262 700060 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.093288 700060 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0012a4cc0 3 D0713 05:28:08.093302 700060 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:08.100314 700060 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.100352 700060 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0012a4cc0 4 D0713 05:28:08.100366 700060 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:08.102577 700060 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.102607 700060 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0012a4cc0 5 D0713 05:28:08.102618 700060 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:08.102887 700060 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.102904 700060 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0012a4cc0 6 D0713 05:28:08.102911 700060 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:08.103418 700060 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.103452 700060 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0012a4cc0 7 D0713 05:28:08.103462 700060 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:08.103651 700060 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.103687 700060 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc0012a4cc0 8 D0713 05:28:08.103700 700060 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:08.104125 700060 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.104183 700060 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc0012a4cc0 9 D0713 05:28:08.104202 700060 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:08.104316 700060 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.104337 700060 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0012a4cc0 10 D0713 05:28:08.104353 700060 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:08.114151 700060 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.114205 700060 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0012a4cc0 11 D0713 05:28:08.114221 700060 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:08.114797 700060 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.114835 700060 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc0012a4cc0 12 D0713 05:28:08.114847 700060 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:08.114899 700060 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.114910 700060 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc0012a4cc0 13 D0713 05:28:08.114919 700060 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:08.115042 700060 task_signals.go:470] [ 954: 954] Notified of signal 23 D0713 05:28:08.115141 700060 task_signals.go:220] [ 954: 954] Signal 23: delivering to handler I0713 05:28:08.126380 700060 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0713 05:28:08.126517 700060 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.126562 700060 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc0012a4cc0 14 D0713 05:28:08.126584 700060 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:08.126658 700060 task_signals.go:470] [ 954: 954] Notified of signal 23 D0713 05:28:08.126717 700060 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.126759 700060 task_signals.go:204] [ 954: 955] Signal 954, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.126791 700060 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.126813 700060 task_signals.go:204] [ 954: 958] Signal 954, PID: 958, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.126825 700060 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.126831 700060 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.126835 700060 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.126847 700060 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.126855 700060 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.126875 700060 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.126897 700060 task_signals.go:204] [ 954: 956] Signal 954, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.126924 700060 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.126933 700060 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.126948 700060 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.126973 700060 task_signals.go:204] [ 954: 957] Signal 954, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.127002 700060 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.128377 700060 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.128408 700060 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.128425 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.128508 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.128517 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.128608 700060 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.129691 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.131214 700060 syscalls.go:262] [ 959: 959] Allocating stack with size of 8388608 bytes D0713 05:28:08.131334 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.132440 700060 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.132475 700060 usertrap_amd64.go:106] [ 959: 959] Map a usertrap vma at 67000 D0713 05:28:08.132578 700060 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0012a4ed0 1 D0713 05:28:08.132610 700060 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:08.133123 700060 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.133143 700060 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0012a4ed0 2 D0713 05:28:08.133157 700060 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:08.133916 700060 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.133942 700060 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0012a4ed0 3 D0713 05:28:08.133950 700060 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:08.141734 700060 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.141769 700060 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0012a4ed0 4 D0713 05:28:08.141782 700060 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:08.143076 700060 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.143105 700060 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0012a4ed0 5 D0713 05:28:08.143123 700060 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:08.143188 700060 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.143205 700060 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0012a4ed0 6 D0713 05:28:08.143215 700060 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:08.143845 700060 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.143868 700060 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0012a4ed0 7 D0713 05:28:08.143879 700060 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:08.144068 700060 usertrap_amd64.go:212] [ 959: 960] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.144092 700060 usertrap_amd64.go:122] [ 959: 960] Allocate a new trap: 0xc0012a4ed0 8 D0713 05:28:08.144103 700060 usertrap_amd64.go:225] [ 959: 960] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:08.144317 700060 usertrap_amd64.go:212] [ 959: 960] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.144340 700060 usertrap_amd64.go:122] [ 959: 960] Allocate a new trap: 0xc0012a4ed0 9 D0713 05:28:08.144351 700060 usertrap_amd64.go:225] [ 959: 960] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:08.144451 700060 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.144472 700060 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0012a4ed0 10 D0713 05:28:08.144482 700060 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:08.153951 700060 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.154009 700060 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0012a4ed0 11 D0713 05:28:08.154028 700060 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:08.154925 700060 usertrap_amd64.go:212] [ 959: 960] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.154977 700060 usertrap_amd64.go:122] [ 959: 960] Allocate a new trap: 0xc0012a4ed0 12 D0713 05:28:08.154997 700060 usertrap_amd64.go:225] [ 959: 960] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:08.155102 700060 usertrap_amd64.go:212] [ 959: 960] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.155126 700060 usertrap_amd64.go:122] [ 959: 960] Allocate a new trap: 0xc0012a4ed0 13 D0713 05:28:08.155136 700060 usertrap_amd64.go:225] [ 959: 960] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:08.155269 700060 task_signals.go:470] [ 959: 959] Notified of signal 23 D0713 05:28:08.155523 700060 task_signals.go:220] [ 959: 959] Signal 23: delivering to handler D0713 05:28:08.166495 700060 task_signals.go:470] [ 959: 959] Notified of signal 23 D0713 05:28:08.167696 700060 task_signals.go:220] [ 959: 959] Signal 23: delivering to handler I0713 05:28:08.168242 700060 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0713 05:28:08.168338 700060 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.168367 700060 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0012a4ed0 14 D0713 05:28:08.168382 700060 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:08.168454 700060 task_exit.go:204] [ 959: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.168491 700060 task_exit.go:204] [ 959: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.168495 700060 task_signals.go:204] [ 959: 960] Signal 959, PID: 960, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.168527 700060 task_signals.go:204] [ 959: 962] Signal 959, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.168524 700060 task_signals.go:204] [ 959: 961] Signal 959, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.168541 700060 task_exit.go:204] [ 959: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.168579 700060 task_exit.go:204] [ 959: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.168593 700060 task_exit.go:204] [ 959: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.168608 700060 task_exit.go:204] [ 959: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.168620 700060 task_exit.go:204] [ 959: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.168625 700060 task_exit.go:204] [ 959: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.168636 700060 task_exit.go:204] [ 959: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.168651 700060 task_exit.go:204] [ 959: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.168659 700060 task_exit.go:204] [ 959: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.168680 700060 task_signals.go:204] [ 959: 963] Signal 959, PID: 963, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.168701 700060 task_exit.go:204] [ 959: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.170173 700060 task_exit.go:204] [ 959: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.170213 700060 task_exit.go:204] [ 959: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.170231 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.170266 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.170285 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.170401 700060 task_exit.go:204] [ 959: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.171449 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.173351 700060 syscalls.go:262] [ 964: 964] Allocating stack with size of 8388608 bytes D0713 05:28:08.173525 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.176739 700060 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.176791 700060 usertrap_amd64.go:106] [ 964: 964] Map a usertrap vma at 61000 D0713 05:28:08.176854 700060 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc001c494a0 1 D0713 05:28:08.176881 700060 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:08.177512 700060 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.177543 700060 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc001c494a0 2 D0713 05:28:08.177558 700060 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:08.178282 700060 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.178309 700060 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc001c494a0 3 D0713 05:28:08.178320 700060 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:08.185838 700060 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.185935 700060 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc001c494a0 4 D0713 05:28:08.185960 700060 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:08.187459 700060 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.187493 700060 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc001c494a0 5 D0713 05:28:08.187514 700060 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:08.187567 700060 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.187575 700060 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc001c494a0 6 D0713 05:28:08.187584 700060 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:08.187789 700060 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.187841 700060 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc001c494a0 7 D0713 05:28:08.187851 700060 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:08.188122 700060 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.188453 700060 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc001c494a0 8 D0713 05:28:08.188539 700060 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:08.189084 700060 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.189116 700060 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc001c494a0 9 D0713 05:28:08.189128 700060 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:08.189284 700060 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.189326 700060 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc001c494a0 10 D0713 05:28:08.189346 700060 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:08.198005 700060 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.198063 700060 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc001c494a0 11 D0713 05:28:08.198091 700060 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:08.201320 700060 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.201375 700060 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc001c494a0 12 D0713 05:28:08.201395 700060 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:08.201495 700060 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.201565 700060 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc001c494a0 13 D0713 05:28:08.201592 700060 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:08.201683 700060 task_signals.go:470] [ 964: 964] Notified of signal 23 D0713 05:28:08.201821 700060 task_signals.go:220] [ 964: 964] Signal 23: delivering to handler I0713 05:28:08.211423 700060 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0713 05:28:08.211528 700060 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.211565 700060 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc001c494a0 14 D0713 05:28:08.211585 700060 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:08.211699 700060 task_exit.go:204] [ 964: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.211739 700060 task_exit.go:204] [ 964: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.211788 700060 task_signals.go:204] [ 964: 965] Signal 964, PID: 965, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.211807 700060 task_exit.go:204] [ 964: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.211804 700060 task_signals.go:204] [ 964: 967] Signal 964, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.211818 700060 task_exit.go:204] [ 964: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.211830 700060 task_exit.go:204] [ 964: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.211879 700060 task_signals.go:204] [ 964: 968] Signal 964, PID: 968, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.211908 700060 task_signals.go:204] [ 964: 969] Signal 964, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.211922 700060 task_exit.go:204] [ 964: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.211934 700060 task_signals.go:204] [ 964: 966] Signal 964, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.211946 700060 task_exit.go:204] [ 964: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.211950 700060 task_exit.go:204] [ 964: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.211957 700060 task_exit.go:204] [ 964: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.211963 700060 task_exit.go:204] [ 964: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.211966 700060 task_exit.go:204] [ 964: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.211974 700060 task_exit.go:204] [ 964: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.211994 700060 task_exit.go:204] [ 964: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.212000 700060 task_exit.go:204] [ 964: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.212012 700060 task_exit.go:204] [ 964: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.213405 700060 task_exit.go:204] [ 964: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.213474 700060 task_exit.go:204] [ 964: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.213510 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.213565 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.213577 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.213660 700060 task_exit.go:204] [ 964: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.213822 700060 task_signals.go:470] [ 5: 19] Notified of signal 23 D0713 05:28:08.213914 700060 task_signals.go:220] [ 5: 19] Signal 23: delivering to handler D0713 05:28:08.214493 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.216795 700060 syscalls.go:262] [ 970: 970] Allocating stack with size of 8388608 bytes D0713 05:28:08.217019 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.226133 700060 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.226240 700060 usertrap_amd64.go:106] [ 970: 970] Map a usertrap vma at 67000 D0713 05:28:08.226378 700060 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000b29200 1 D0713 05:28:08.226586 700060 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:08.227173 700060 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.227211 700060 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000b29200 2 D0713 05:28:08.227232 700060 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:08.227895 700060 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.227926 700060 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000b29200 3 D0713 05:28:08.227940 700060 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:08.236236 700060 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.236307 700060 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000b29200 4 D0713 05:28:08.236328 700060 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:08.237757 700060 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.237834 700060 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000b29200 5 D0713 05:28:08.237856 700060 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:08.237921 700060 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.237945 700060 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000b29200 6 D0713 05:28:08.237956 700060 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:08.238324 700060 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.238348 700060 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000b29200 7 D0713 05:28:08.238356 700060 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:08.238592 700060 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.238624 700060 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc000b29200 8 D0713 05:28:08.238641 700060 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:08.239057 700060 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.239083 700060 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc000b29200 9 D0713 05:28:08.239094 700060 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:08.239107 700060 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.239115 700060 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000b29200 10 D0713 05:28:08.239122 700060 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:08.239329 700060 usertrap_amd64.go:212] [ 970: 973] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.239363 700060 usertrap_amd64.go:122] [ 970: 973] Allocate a new trap: 0xc000b29200 11 D0713 05:28:08.239381 700060 usertrap_amd64.go:225] [ 970: 973] Apply the binary patch addr 46b6e0 trap addr 67370 ([184 24 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:08.239902 700060 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.239989 700060 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc000b29200 12 D0713 05:28:08.240002 700060 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:08.240188 700060 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.240339 700060 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc000b29200 13 D0713 05:28:08.240367 700060 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:08.240503 700060 task_signals.go:470] [ 970: 970] Notified of signal 23 D0713 05:28:08.240563 700060 task_signals.go:220] [ 970: 970] Signal 23: delivering to handler D0713 05:28:08.249198 700060 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.249252 700060 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000b29200 14 D0713 05:28:08.249272 700060 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46af29 trap addr 67460 ([184 37 1 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:08.252016 700060 task_signals.go:470] [ 970: 970] Notified of signal 23 D0713 05:28:08.252093 700060 task_signals.go:220] [ 970: 970] Signal 23: delivering to handler I0713 05:28:08.261633 700060 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0713 05:28:08.261776 700060 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.261815 700060 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000b29200 15 D0713 05:28:08.261832 700060 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 05:28:08.261912 700060 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.261941 700060 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.261977 700060 task_signals.go:204] [ 970: 971] Signal 970, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.261998 700060 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.262010 700060 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.262017 700060 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.262039 700060 task_signals.go:204] [ 970: 973] Signal 970, PID: 973, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.262055 700060 task_signals.go:204] [ 970: 974] Signal 970, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.262081 700060 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.262153 700060 task_signals.go:204] [ 970: 972] Signal 970, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.262226 700060 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.262261 700060 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.262287 700060 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.262296 700060 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.262300 700060 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.262310 700060 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.263756 700060 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.263797 700060 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.263828 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.263869 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.263882 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.263964 700060 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.264654 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.266827 700060 syscalls.go:262] [ 975: 975] Allocating stack with size of 8388608 bytes D0713 05:28:08.267031 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.270029 700060 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.270079 700060 usertrap_amd64.go:106] [ 975: 975] Map a usertrap vma at 61000 D0713 05:28:08.270182 700060 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001bd7e90 1 D0713 05:28:08.270215 700060 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:08.270595 700060 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.270617 700060 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001bd7e90 2 D0713 05:28:08.270632 700060 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:08.271285 700060 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.271309 700060 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001bd7e90 3 D0713 05:28:08.271318 700060 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:08.278377 700060 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.278421 700060 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001bd7e90 4 D0713 05:28:08.278437 700060 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:08.279636 700060 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.279677 700060 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001bd7e90 5 D0713 05:28:08.279693 700060 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:08.279757 700060 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.279775 700060 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001bd7e90 6 D0713 05:28:08.279795 700060 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:08.280452 700060 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.280513 700060 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001bd7e90 7 D0713 05:28:08.280536 700060 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:08.280741 700060 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.280767 700060 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc001bd7e90 8 D0713 05:28:08.280780 700060 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:08.281105 700060 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.281139 700060 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc001bd7e90 9 D0713 05:28:08.281152 700060 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:08.281190 700060 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.281210 700060 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001bd7e90 10 D0713 05:28:08.281225 700060 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:08.290296 700060 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.290353 700060 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001bd7e90 11 D0713 05:28:08.290373 700060 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:08.292901 700060 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.292962 700060 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc001bd7e90 12 D0713 05:28:08.292981 700060 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:08.293026 700060 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.293032 700060 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc001bd7e90 13 D0713 05:28:08.293039 700060 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:08.293057 700060 task_signals.go:470] [ 975: 975] Notified of signal 23 D0713 05:28:08.293202 700060 task_signals.go:220] [ 975: 975] Signal 23: delivering to handler I0713 05:28:08.302204 700060 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0713 05:28:08.302346 700060 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.302384 700060 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc001bd7e90 14 D0713 05:28:08.302405 700060 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:08.302489 700060 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.302530 700060 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.302565 700060 task_signals.go:204] [ 975: 976] Signal 975, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.302594 700060 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.302606 700060 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.302613 700060 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.302644 700060 task_signals.go:204] [ 975: 977] Signal 975, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.302664 700060 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.302674 700060 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.302680 700060 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.302703 700060 task_signals.go:204] [ 975: 978] Signal 975, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.302727 700060 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.302736 700060 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.302742 700060 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.302760 700060 task_signals.go:204] [ 975: 979] Signal 975, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.302782 700060 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.304128 700060 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.304155 700060 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.304172 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.304204 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.304211 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.304423 700060 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.305410 700060 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.307174 700060 syscalls.go:262] [ 980: 980] Allocating stack with size of 8388608 bytes D0713 05:28:08.307439 700060 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.309361 700060 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.309429 700060 usertrap_amd64.go:106] [ 980: 980] Map a usertrap vma at 62000 D0713 05:28:08.309529 700060 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc001bd7f20 1 D0713 05:28:08.309582 700060 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:08.310546 700060 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.310582 700060 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc001bd7f20 2 D0713 05:28:08.310600 700060 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:08.311692 700060 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.311728 700060 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc001bd7f20 3 D0713 05:28:08.311745 700060 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:08.319834 700060 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.319896 700060 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc001bd7f20 4 D0713 05:28:08.319916 700060 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:08.321380 700060 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.321431 700060 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc001bd7f20 5 D0713 05:28:08.321450 700060 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:08.321505 700060 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.321517 700060 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc001bd7f20 6 D0713 05:28:08.321523 700060 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:08.321760 700060 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.321779 700060 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc001bd7f20 7 D0713 05:28:08.321785 700060 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:08.321991 700060 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.322048 700060 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc001bd7f20 8 D0713 05:28:08.322066 700060 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:08.322313 700060 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.322348 700060 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc001bd7f20 9 D0713 05:28:08.322363 700060 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:08.322434 700060 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.322458 700060 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc001bd7f20 10 D0713 05:28:08.322475 700060 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:08.331653 700060 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.331707 700060 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc001bd7f20 11 D0713 05:28:08.331725 700060 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:08.332780 700060 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.332823 700060 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc001bd7f20 12 D0713 05:28:08.334602 700060 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:08.334723 700060 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.334752 700060 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc001bd7f20 13 D0713 05:28:08.334767 700060 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:08.334789 700060 task_signals.go:470] [ 980: 980] Notified of signal 23 D0713 05:28:08.334914 700060 task_signals.go:220] [ 980: 980] Signal 23: delivering to handler I0713 05:28:08.345104 700060 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0713 05:28:08.345218 700060 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.345261 700060 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc001bd7f20 14 D0713 05:28:08.345283 700060 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:08.345371 700060 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.345403 700060 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.345446 700060 task_signals.go:204] [ 980: 984] Signal 980, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.345471 700060 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.345478 700060 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.345482 700060 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.345468 700060 task_signals.go:204] [ 980: 981] Signal 980, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.345505 700060 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.345501 700060 task_signals.go:204] [ 980: 983] Signal 980, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.345524 700060 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.345534 700060 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.345448 700060 task_signals.go:204] [ 980: 982] Signal 980, PID: 982, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.345573 700060 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.345595 700060 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.345601 700060 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.345617 700060 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.347107 700060 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.347151 700060 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.347183 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.347232 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.347243 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.347438 700060 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.348209 700060 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.349962 700060 syscalls.go:262] [ 985: 985] Allocating stack with size of 8388608 bytes D0713 05:28:08.350102 700060 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.351337 700060 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.351389 700060 usertrap_amd64.go:106] [ 985: 985] Map a usertrap vma at 65000 D0713 05:28:08.351511 700060 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000b29500 1 D0713 05:28:08.351554 700060 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:08.352121 700060 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.352163 700060 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000b29500 2 D0713 05:28:08.352181 700060 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:08.353087 700060 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.353121 700060 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000b29500 3 D0713 05:28:08.353139 700060 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:08.360492 700060 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.360565 700060 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000b29500 4 D0713 05:28:08.360587 700060 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:08.362102 700060 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.362145 700060 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000b29500 5 D0713 05:28:08.362161 700060 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:08.362209 700060 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.362220 700060 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000b29500 6 D0713 05:28:08.362227 700060 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:08.362467 700060 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.362490 700060 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000b29500 7 D0713 05:28:08.362510 700060 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:08.362735 700060 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.362768 700060 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc000b29500 8 D0713 05:28:08.362783 700060 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:08.363077 700060 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.363131 700060 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc000b29500 9 D0713 05:28:08.363192 700060 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:08.363230 700060 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.363239 700060 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000b29500 10 D0713 05:28:08.363250 700060 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:08.372694 700060 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.372735 700060 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000b29500 11 D0713 05:28:08.372751 700060 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:08.375140 700060 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.375183 700060 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc000b29500 12 D0713 05:28:08.375210 700060 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:08.375260 700060 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.375271 700060 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc000b29500 13 D0713 05:28:08.375295 700060 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:08.375366 700060 task_signals.go:470] [ 985: 985] Notified of signal 23 D0713 05:28:08.375513 700060 task_signals.go:220] [ 985: 985] Signal 23: delivering to handler D0713 05:28:08.383216 700060 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.383278 700060 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc000b29500 14 D0713 05:28:08.383297 700060 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:08.383405 700060 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.383443 700060 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.383478 700060 task_signals.go:204] [ 985: 989] Signal 985, PID: 989, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.383474 700060 task_signals.go:204] [ 985: 988] Signal 985, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.383499 700060 task_signals.go:204] [ 985: 987] Signal 985, PID: 987, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.383508 700060 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.383529 700060 task_signals.go:204] [ 985: 986] Signal 985, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.383547 700060 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.383575 700060 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.383593 700060 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.383602 700060 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.383607 700060 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.383616 700060 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.383622 700060 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.383626 700060 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.383635 700060 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.384691 700060 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.384719 700060 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.384736 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.384783 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.384794 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.385095 700060 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.385192 700060 task_signals.go:470] [ 5: 9] Notified of signal 23 D0713 05:28:08.385232 700060 task_signals.go:179] [ 5: 9] Restarting syscall 202: interrupted by signal 23 D0713 05:28:08.385258 700060 task_signals.go:220] [ 5: 9] Signal 23: delivering to handler D0713 05:28:08.385835 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.387308 700060 syscalls.go:262] [ 990: 990] Allocating stack with size of 8388608 bytes D0713 05:28:08.387457 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.388399 700060 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.388447 700060 usertrap_amd64.go:106] [ 990: 990] Map a usertrap vma at 61000 D0713 05:28:08.388592 700060 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0001f8a50 1 D0713 05:28:08.388642 700060 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:08.389566 700060 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.389594 700060 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0001f8a50 2 D0713 05:28:08.389607 700060 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:08.390438 700060 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.390468 700060 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0001f8a50 3 D0713 05:28:08.390481 700060 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:08.396293 700060 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.396343 700060 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0001f8a50 4 D0713 05:28:08.396359 700060 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:08.397614 700060 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.397640 700060 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0001f8a50 5 D0713 05:28:08.397650 700060 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:08.397699 700060 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.397707 700060 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0001f8a50 6 D0713 05:28:08.397715 700060 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:08.397930 700060 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.397953 700060 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0001f8a50 7 D0713 05:28:08.397961 700060 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:08.398151 700060 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.398180 700060 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc0001f8a50 8 D0713 05:28:08.398194 700060 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:08.398436 700060 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.398462 700060 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0001f8a50 9 D0713 05:28:08.398475 700060 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:08.398489 700060 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.398495 700060 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc0001f8a50 10 D0713 05:28:08.398508 700060 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:08.398642 700060 usertrap_amd64.go:212] [ 990: 993] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.398675 700060 usertrap_amd64.go:122] [ 990: 993] Allocate a new trap: 0xc0001f8a50 11 D0713 05:28:08.398688 700060 usertrap_amd64.go:225] [ 990: 993] Apply the binary patch addr 46b6e0 trap addr 61370 ([184 24 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:08.405112 700060 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.405144 700060 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0001f8a50 12 D0713 05:28:08.405154 700060 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:08.409039 700060 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.409058 700060 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc0001f8a50 13 D0713 05:28:08.409078 700060 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:08.409138 700060 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.409148 700060 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc0001f8a50 14 D0713 05:28:08.409157 700060 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:08.409254 700060 task_signals.go:470] [ 990: 990] Notified of signal 23 D0713 05:28:08.409439 700060 task_signals.go:220] [ 990: 990] Signal 23: delivering to handler D0713 05:28:08.415238 700060 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.415259 700060 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc0001f8a50 15 D0713 05:28:08.415272 700060 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 05:28:08.415341 700060 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.415371 700060 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.415395 700060 task_signals.go:204] [ 990: 993] Signal 990, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.415401 700060 task_signals.go:204] [ 990: 992] Signal 990, PID: 992, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.415413 700060 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.415422 700060 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.415438 700060 task_signals.go:204] [ 990: 994] Signal 990, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.415451 700060 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.415466 700060 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.415485 700060 task_signals.go:204] [ 990: 991] Signal 990, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.415506 700060 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.415516 700060 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.415526 700060 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.415537 700060 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.415543 700060 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.415553 700060 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.416573 700060 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.416604 700060 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.416622 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.416699 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.416723 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.416878 700060 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.417744 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.419060 700060 syscalls.go:262] [ 995: 995] Allocating stack with size of 8388608 bytes D0713 05:28:08.419167 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.420331 700060 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.420380 700060 usertrap_amd64.go:106] [ 995: 995] Map a usertrap vma at 64000 D0713 05:28:08.420789 700060 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0001f8cf0 1 D0713 05:28:08.420830 700060 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:08.421484 700060 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.421512 700060 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0001f8cf0 2 D0713 05:28:08.421647 700060 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:08.422416 700060 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.422451 700060 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0001f8cf0 3 D0713 05:28:08.422465 700060 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:08.429639 700060 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.429679 700060 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0001f8cf0 4 D0713 05:28:08.429713 700060 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:08.430767 700060 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.430798 700060 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0001f8cf0 5 D0713 05:28:08.430808 700060 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:08.430913 700060 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.430929 700060 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0001f8cf0 6 D0713 05:28:08.430945 700060 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:08.431215 700060 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.431238 700060 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0001f8cf0 7 D0713 05:28:08.431250 700060 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:08.431445 700060 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.431469 700060 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc0001f8cf0 8 D0713 05:28:08.431481 700060 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:08.431629 700060 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.431638 700060 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc0001f8cf0 9 D0713 05:28:08.431647 700060 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:08.431737 700060 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.431783 700060 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0001f8cf0 10 D0713 05:28:08.431798 700060 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:08.438657 700060 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.438692 700060 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0001f8cf0 11 D0713 05:28:08.438706 700060 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:08.442512 700060 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.442548 700060 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc0001f8cf0 12 D0713 05:28:08.442566 700060 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:08.442621 700060 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.442655 700060 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc0001f8cf0 13 D0713 05:28:08.442669 700060 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:08.442720 700060 task_signals.go:470] [ 995: 995] Notified of signal 23 D0713 05:28:08.442793 700060 task_signals.go:220] [ 995: 995] Signal 23: delivering to handler D0713 05:28:08.449598 700060 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.449630 700060 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0001f8cf0 14 D0713 05:28:08.449645 700060 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:08.449693 700060 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.449714 700060 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.449740 700060 task_signals.go:204] [ 995: 996] Signal 995, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.449769 700060 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.449778 700060 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.449783 700060 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.449801 700060 task_signals.go:204] [ 995: 997] Signal 995, PID: 997, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.449815 700060 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.449824 700060 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.449830 700060 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.449849 700060 task_signals.go:204] [ 995: 998] Signal 995, PID: 998, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.449885 700060 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.449894 700060 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.449900 700060 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.449926 700060 task_signals.go:204] [ 995: 999] Signal 995, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.449949 700060 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.450932 700060 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.450965 700060 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.450978 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.451004 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.451014 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.451290 700060 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.451426 700060 task_signals.go:470] [ 5: 19] Notified of signal 23 D0713 05:28:08.451481 700060 task_signals.go:220] [ 5: 19] Signal 23: delivering to handler I0713 05:28:08.451605 700060 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0713 05:28:08.452161 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.453678 700060 syscalls.go:262] [ 1000: 1000] Allocating stack with size of 8388608 bytes D0713 05:28:08.453779 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.455153 700060 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.455195 700060 usertrap_amd64.go:106] [ 1000: 1000] Map a usertrap vma at 60000 D0713 05:28:08.455264 700060 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0001f9140 1 D0713 05:28:08.455282 700060 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:08.455721 700060 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.455748 700060 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0001f9140 2 D0713 05:28:08.455757 700060 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:08.456390 700060 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.456414 700060 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0001f9140 3 D0713 05:28:08.456425 700060 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:08.461796 700060 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.461826 700060 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0001f9140 4 D0713 05:28:08.461839 700060 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:08.462906 700060 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.462922 700060 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0001f9140 5 D0713 05:28:08.462931 700060 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:08.462986 700060 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.462994 700060 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0001f9140 6 D0713 05:28:08.463003 700060 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:08.463231 700060 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.463242 700060 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0001f9140 7 D0713 05:28:08.463250 700060 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:08.463372 700060 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.463399 700060 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc0001f9140 8 D0713 05:28:08.463409 700060 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:08.463625 700060 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.463654 700060 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc0001f9140 9 D0713 05:28:08.463666 700060 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:08.463850 700060 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.463876 700060 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0001f9140 10 D0713 05:28:08.463887 700060 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:08.471340 700060 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.471407 700060 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0001f9140 11 D0713 05:28:08.471426 700060 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:08.474058 700060 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.474095 700060 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc0001f9140 12 D0713 05:28:08.474105 700060 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:08.474135 700060 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.474140 700060 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc0001f9140 13 D0713 05:28:08.474149 700060 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:08.474161 700060 task_signals.go:470] [ 1000: 1000] Notified of signal 23 D0713 05:28:08.474411 700060 task_signals.go:220] [ 1000: 1000] Signal 23: delivering to handler I0713 05:28:08.481145 700060 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0713 05:28:08.481212 700060 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.481220 700060 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0001f9140 14 D0713 05:28:08.481228 700060 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:08.481250 700060 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.481289 700060 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.481302 700060 task_signals.go:204] [ 1000: 1004] Signal 1000, PID: 1004, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.481292 700060 task_signals.go:204] [ 1000: 1001] Signal 1000, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.481315 700060 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.481320 700060 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.481324 700060 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.481310 700060 task_signals.go:204] [ 1000: 1003] Signal 1000, PID: 1003, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.481314 700060 task_signals.go:204] [ 1000: 1002] Signal 1000, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.481330 700060 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.481362 700060 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.481367 700060 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.481378 700060 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.481386 700060 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.481392 700060 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.481402 700060 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.482267 700060 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.482289 700060 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.482300 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.482319 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.482325 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.482513 700060 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.482898 700060 task_signals.go:470] [ 5: 19] Notified of signal 23 D0713 05:28:08.483106 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.484320 700060 syscalls.go:262] [ 1005: 1005] Allocating stack with size of 8388608 bytes D0713 05:28:08.484441 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.484588 700060 task_signals.go:220] [ 5: 19] Signal 23: delivering to handler D0713 05:28:08.485441 700060 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.485477 700060 usertrap_amd64.go:106] [ 1005: 1005] Map a usertrap vma at 63000 D0713 05:28:08.485575 700060 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc0009442a0 1 D0713 05:28:08.485605 700060 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:08.486022 700060 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.486051 700060 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc0009442a0 2 D0713 05:28:08.486063 700060 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:08.486830 700060 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.486868 700060 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc0009442a0 3 D0713 05:28:08.486880 700060 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:08.492248 700060 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.492282 700060 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc0009442a0 4 D0713 05:28:08.492295 700060 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:08.493341 700060 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.493366 700060 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc0009442a0 5 D0713 05:28:08.493376 700060 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:08.493461 700060 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.493485 700060 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc0009442a0 6 D0713 05:28:08.493495 700060 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:08.494035 700060 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.494051 700060 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc0009442a0 7 D0713 05:28:08.494063 700060 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:08.494205 700060 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.494216 700060 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc0009442a0 8 D0713 05:28:08.494223 700060 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:08.494427 700060 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.494458 700060 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc0009442a0 9 D0713 05:28:08.494470 700060 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:08.494483 700060 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.494491 700060 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc0009442a0 10 D0713 05:28:08.494498 700060 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:08.501028 700060 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.501059 700060 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc0009442a0 11 D0713 05:28:08.501070 700060 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:08.504717 700060 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.504750 700060 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc0009442a0 12 D0713 05:28:08.504762 700060 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:08.504779 700060 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.504786 700060 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc0009442a0 13 D0713 05:28:08.504792 700060 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:08.504809 700060 task_signals.go:470] [ 1005: 1005] Notified of signal 23 D0713 05:28:08.504870 700060 task_signals.go:220] [ 1005: 1005] Signal 23: delivering to handler I0713 05:28:08.509358 700060 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0713 05:28:08.509478 700060 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.509500 700060 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc0009442a0 14 D0713 05:28:08.509510 700060 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:08.509549 700060 task_exit.go:204] [ 1005: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.509578 700060 task_signals.go:204] [ 1005: 1006] Signal 1005, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.509605 700060 task_signals.go:204] [ 1005: 1009] Signal 1005, PID: 1009, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.509617 700060 task_exit.go:204] [ 1005: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.509639 700060 task_signals.go:204] [ 1005: 1007] Signal 1005, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.509661 700060 task_exit.go:204] [ 1005: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.509659 700060 task_signals.go:204] [ 1005: 1008] Signal 1005, PID: 1008, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.509669 700060 task_exit.go:204] [ 1005: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.509681 700060 task_exit.go:204] [ 1005: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.509695 700060 task_exit.go:204] [ 1005: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.509712 700060 task_exit.go:204] [ 1005: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.509723 700060 task_exit.go:204] [ 1005: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.509732 700060 task_exit.go:204] [ 1005: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.509763 700060 task_exit.go:204] [ 1005: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.509773 700060 task_exit.go:204] [ 1005: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.509786 700060 task_exit.go:204] [ 1005: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.510625 700060 task_exit.go:204] [ 1005: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.510642 700060 task_exit.go:204] [ 1005: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.510652 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.510680 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.510697 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.510806 700060 task_signals.go:470] [ 5: 19] Notified of signal 23 D0713 05:28:08.510835 700060 task_exit.go:204] [ 1005: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.510851 700060 task_signals.go:220] [ 5: 19] Signal 23: delivering to handler D0713 05:28:08.511474 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.512765 700060 syscalls.go:262] [ 1010: 1010] Allocating stack with size of 8388608 bytes D0713 05:28:08.512844 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.514022 700060 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.514061 700060 usertrap_amd64.go:106] [ 1010: 1010] Map a usertrap vma at 6a000 D0713 05:28:08.514129 700060 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0008680f0 1 D0713 05:28:08.514148 700060 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:08.514327 700060 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.514351 700060 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0008680f0 2 D0713 05:28:08.514360 700060 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:08.514955 700060 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.514989 700060 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0008680f0 3 D0713 05:28:08.515000 700060 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:08.521026 700060 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.521074 700060 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0008680f0 4 D0713 05:28:08.521084 700060 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:08.522019 700060 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.522055 700060 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0008680f0 5 D0713 05:28:08.522068 700060 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:08.522122 700060 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.522132 700060 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0008680f0 6 D0713 05:28:08.522140 700060 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:08.522336 700060 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.522360 700060 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0008680f0 7 D0713 05:28:08.522372 700060 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:08.522656 700060 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.522691 700060 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc0008680f0 8 D0713 05:28:08.522706 700060 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:08.522984 700060 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.523028 700060 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc0008680f0 9 D0713 05:28:08.523039 700060 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:08.523117 700060 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.523144 700060 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0008680f0 10 D0713 05:28:08.523153 700060 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b6e0 trap addr 6a320 ([184 24 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:08.523198 700060 usertrap_amd64.go:212] [ 1010: 1013] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.523206 700060 usertrap_amd64.go:122] [ 1010: 1013] Allocate a new trap: 0xc0008680f0 11 D0713 05:28:08.523212 700060 usertrap_amd64.go:225] [ 1010: 1013] Apply the binary patch addr 46b57c trap addr 6a370 ([184 202 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:08.531295 700060 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.531325 700060 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0008680f0 12 D0713 05:28:08.531335 700060 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:08.533672 700060 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.533722 700060 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc0008680f0 13 D0713 05:28:08.533747 700060 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:08.533843 700060 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.533876 700060 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc0008680f0 14 D0713 05:28:08.533893 700060 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:08.533961 700060 task_signals.go:470] [ 1010: 1010] Notified of signal 23 D0713 05:28:08.534021 700060 task_signals.go:220] [ 1010: 1010] Signal 23: delivering to handler D0713 05:28:08.540908 700060 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.540956 700060 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0008680f0 15 D0713 05:28:08.540971 700060 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 05:28:08.541038 700060 task_exit.go:204] [ 1010: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.541058 700060 task_exit.go:204] [ 1010: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.541090 700060 task_signals.go:204] [ 1010: 1011] Signal 1010, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.541118 700060 task_exit.go:204] [ 1010: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.541144 700060 task_exit.go:204] [ 1010: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.541150 700060 task_exit.go:204] [ 1010: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.541146 700060 task_signals.go:204] [ 1010: 1014] Signal 1010, PID: 1014, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.541119 700060 task_signals.go:204] [ 1010: 1013] Signal 1010, PID: 1013, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.541164 700060 task_exit.go:204] [ 1010: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.541172 700060 task_signals.go:204] [ 1010: 1012] Signal 1010, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.541188 700060 task_exit.go:204] [ 1010: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.541193 700060 task_exit.go:204] [ 1010: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.541204 700060 task_exit.go:204] [ 1010: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.541234 700060 task_exit.go:204] [ 1010: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.541240 700060 task_exit.go:204] [ 1010: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.541249 700060 task_exit.go:204] [ 1010: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.542428 700060 task_exit.go:204] [ 1010: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.542519 700060 task_exit.go:204] [ 1010: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.542647 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.542696 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.542822 700060 task_exit.go:204] [ 1010: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.542716 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.543029 700060 task_signals.go:470] [ 5: 19] Notified of signal 23 D0713 05:28:08.543083 700060 task_signals.go:179] [ 5: 19] Restarting syscall 202: interrupted by signal 23 D0713 05:28:08.543097 700060 task_signals.go:220] [ 5: 19] Signal 23: delivering to handler D0713 05:28:08.543386 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.545053 700060 syscalls.go:262] [ 1015: 1015] Allocating stack with size of 8388608 bytes D0713 05:28:08.545203 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.547483 700060 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.547521 700060 usertrap_amd64.go:106] [ 1015: 1015] Map a usertrap vma at 6a000 D0713 05:28:08.547608 700060 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000945800 1 D0713 05:28:08.547658 700060 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:08.548673 700060 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.548708 700060 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000945800 2 D0713 05:28:08.548720 700060 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:08.549456 700060 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.549481 700060 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000945800 3 D0713 05:28:08.549492 700060 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:08.556544 700060 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.556600 700060 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000945800 4 D0713 05:28:08.556623 700060 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:08.559398 700060 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.559436 700060 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000945800 5 D0713 05:28:08.559457 700060 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:08.559512 700060 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.559527 700060 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000945800 6 D0713 05:28:08.559536 700060 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:08.559755 700060 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.559776 700060 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000945800 7 D0713 05:28:08.559786 700060 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:08.559970 700060 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.559999 700060 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc000945800 8 D0713 05:28:08.560011 700060 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:08.560191 700060 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.560214 700060 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000945800 9 D0713 05:28:08.560224 700060 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:08.560235 700060 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.560240 700060 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc000945800 10 D0713 05:28:08.560248 700060 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:08.567002 700060 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.567036 700060 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000945800 11 D0713 05:28:08.567045 700060 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:08.570350 700060 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.570483 700060 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc000945800 12 D0713 05:28:08.570511 700060 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:08.570555 700060 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.570589 700060 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc000945800 13 D0713 05:28:08.570604 700060 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:08.570975 700060 task_signals.go:470] [ 1015: 1015] Notified of signal 23 D0713 05:28:08.571151 700060 task_signals.go:220] [ 1015: 1015] Signal 23: delivering to handler D0713 05:28:08.576250 700060 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.576276 700060 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc000945800 14 D0713 05:28:08.576288 700060 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:08.576307 700060 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.576321 700060 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.576342 700060 task_signals.go:204] [ 1015: 1018] Signal 1015, PID: 1018, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.576376 700060 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.576338 700060 task_signals.go:204] [ 1015: 1016] Signal 1015, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.576387 700060 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.576407 700060 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.576358 700060 task_signals.go:204] [ 1015: 1017] Signal 1015, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.576439 700060 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.576452 700060 task_signals.go:204] [ 1015: 1019] Signal 1015, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.576476 700060 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.576481 700060 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.576490 700060 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.576519 700060 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.576526 700060 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.576542 700060 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.577768 700060 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.577801 700060 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.577828 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.577860 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.577871 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.578022 700060 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.578155 700060 task_signals.go:470] [ 5: 7] Notified of signal 23 D0713 05:28:08.578194 700060 task_signals.go:220] [ 5: 7] Signal 23: delivering to handler D0713 05:28:08.578615 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.579948 700060 syscalls.go:262] [ 1020: 1020] Allocating stack with size of 8388608 bytes D0713 05:28:08.580037 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.581498 700060 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.581543 700060 usertrap_amd64.go:106] [ 1020: 1020] Map a usertrap vma at 64000 D0713 05:28:08.581730 700060 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0001f9770 1 D0713 05:28:08.581773 700060 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:08.582336 700060 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.582363 700060 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0001f9770 2 D0713 05:28:08.582376 700060 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:08.583504 700060 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.583535 700060 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0001f9770 3 D0713 05:28:08.583549 700060 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:08.591287 700060 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.591320 700060 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0001f9770 4 D0713 05:28:08.591335 700060 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:08.592283 700060 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.592304 700060 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0001f9770 5 D0713 05:28:08.592314 700060 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:08.592362 700060 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.592368 700060 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0001f9770 6 D0713 05:28:08.592374 700060 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:08.592731 700060 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.592760 700060 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0001f9770 7 D0713 05:28:08.592782 700060 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:08.593053 700060 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.593074 700060 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0001f9770 8 D0713 05:28:08.593085 700060 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:08.593265 700060 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.593292 700060 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0001f9770 9 D0713 05:28:08.593305 700060 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:08.593377 700060 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.593402 700060 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0001f9770 10 D0713 05:28:08.593423 700060 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:08.593904 700060 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.593926 700060 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0001f9770 11 D0713 05:28:08.593933 700060 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:08.593997 700060 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.594015 700060 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0001f9770 12 D0713 05:28:08.594023 700060 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:08.594070 700060 task_signals.go:470] [ 1020: 1020] Notified of signal 23 D0713 05:28:08.594119 700060 task_signals.go:220] [ 1020: 1020] Signal 23: delivering to handler D0713 05:28:08.599712 700060 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.599732 700060 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0001f9770 13 D0713 05:28:08.599740 700060 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:08.604822 700060 task_signals.go:470] [ 1020: 1020] Notified of signal 23 D0713 05:28:08.605187 700060 task_signals.go:220] [ 1020: 1020] Signal 23: delivering to handler D0713 05:28:08.608846 700060 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.608876 700060 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0001f9770 14 D0713 05:28:08.608895 700060 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:08.609062 700060 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.609098 700060 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.609114 700060 task_signals.go:204] [ 1020: 1024] Signal 1020, PID: 1024, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.609139 700060 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.609152 700060 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.609159 700060 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.609151 700060 task_signals.go:204] [ 1020: 1023] Signal 1020, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.609123 700060 task_signals.go:204] [ 1020: 1022] Signal 1020, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.609168 700060 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.609176 700060 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.609181 700060 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.609135 700060 task_signals.go:204] [ 1020: 1021] Signal 1020, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.609193 700060 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.609213 700060 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.609223 700060 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.609233 700060 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.610168 700060 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.610194 700060 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.610213 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.610239 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.610248 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.610427 700060 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.611124 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.613068 700060 syscalls.go:262] [ 1025: 1025] Allocating stack with size of 8388608 bytes D0713 05:28:08.613219 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.614602 700060 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.614636 700060 usertrap_amd64.go:106] [ 1025: 1025] Map a usertrap vma at 62000 D0713 05:28:08.614704 700060 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000868720 1 D0713 05:28:08.614736 700060 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:08.615159 700060 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.615183 700060 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000868720 2 D0713 05:28:08.615193 700060 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:08.615933 700060 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.616017 700060 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000868720 3 D0713 05:28:08.616044 700060 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:08.621674 700060 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.621700 700060 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000868720 4 D0713 05:28:08.621709 700060 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:08.622779 700060 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.622800 700060 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000868720 5 D0713 05:28:08.622808 700060 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:08.622861 700060 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.622869 700060 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000868720 6 D0713 05:28:08.622876 700060 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:08.623056 700060 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.623076 700060 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000868720 7 D0713 05:28:08.623083 700060 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:08.623205 700060 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.623219 700060 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000868720 8 D0713 05:28:08.623227 700060 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:08.623418 700060 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.623444 700060 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000868720 9 D0713 05:28:08.623456 700060 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:08.623656 700060 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.623678 700060 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000868720 10 D0713 05:28:08.623687 700060 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:08.630440 700060 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.630468 700060 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000868720 11 D0713 05:28:08.630479 700060 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:08.634350 700060 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.634473 700060 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000868720 12 D0713 05:28:08.634499 700060 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:08.634562 700060 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.634573 700060 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000868720 13 D0713 05:28:08.634582 700060 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:08.634596 700060 task_signals.go:470] [ 1025: 1025] Notified of signal 23 D0713 05:28:08.634762 700060 task_signals.go:220] [ 1025: 1025] Signal 23: delivering to handler D0713 05:28:08.640375 700060 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.640409 700060 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000868720 14 D0713 05:28:08.640422 700060 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:08.640468 700060 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.640487 700060 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.640565 700060 task_signals.go:204] [ 1025: 1028] Signal 1025, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.640574 700060 task_signals.go:204] [ 1025: 1026] Signal 1025, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.640585 700060 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.640583 700060 task_signals.go:204] [ 1025: 1029] Signal 1025, PID: 1029, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.640601 700060 task_signals.go:204] [ 1025: 1027] Signal 1025, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.640618 700060 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.640625 700060 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.640638 700060 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.640651 700060 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.640655 700060 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.640661 700060 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.640666 700060 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.640669 700060 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.640676 700060 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.641665 700060 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.641681 700060 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.641705 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.641734 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.641768 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.641867 700060 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.642017 700060 task_signals.go:470] [ 5: 19] Notified of signal 23 D0713 05:28:08.642120 700060 task_signals.go:220] [ 5: 19] Signal 23: delivering to handler D0713 05:28:08.642610 700060 task_signals.go:481] [ 5: 19] No task notified of signal 23 D0713 05:28:08.642741 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.644242 700060 syscalls.go:262] [ 1030: 1030] Allocating stack with size of 8388608 bytes D0713 05:28:08.644415 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.644531 700060 task_signals.go:220] [ 5: 19] Signal 23: delivering to handler D0713 05:28:08.644789 700060 task_signals.go:470] [ 5: 19] Notified of signal 23 D0713 05:28:08.644829 700060 task_signals.go:220] [ 5: 19] Signal 23: delivering to handler D0713 05:28:08.645792 700060 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.645854 700060 usertrap_amd64.go:106] [ 1030: 1030] Map a usertrap vma at 68000 D0713 05:28:08.645951 700060 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000945ad0 1 D0713 05:28:08.645987 700060 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:08.646458 700060 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.646486 700060 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000945ad0 2 D0713 05:28:08.646500 700060 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:08.647224 700060 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.647246 700060 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000945ad0 3 D0713 05:28:08.647258 700060 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:08.652550 700060 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.652567 700060 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000945ad0 4 D0713 05:28:08.652578 700060 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:08.653891 700060 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.653922 700060 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000945ad0 5 D0713 05:28:08.653935 700060 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:08.653985 700060 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.653997 700060 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000945ad0 6 D0713 05:28:08.654006 700060 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:08.654242 700060 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.654262 700060 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000945ad0 7 D0713 05:28:08.654271 700060 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:08.654450 700060 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.654472 700060 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc000945ad0 8 D0713 05:28:08.654483 700060 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:08.654770 700060 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.654793 700060 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000945ad0 9 D0713 05:28:08.654808 700060 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:08.654890 700060 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.654925 700060 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc000945ad0 10 D0713 05:28:08.654936 700060 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:08.655031 700060 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.655054 700060 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc000945ad0 11 D0713 05:28:08.655065 700060 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:08.655127 700060 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.655155 700060 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc000945ad0 12 D0713 05:28:08.655162 700060 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:08.655222 700060 task_signals.go:470] [ 1030: 1033] Notified of signal 23 D0713 05:28:08.655334 700060 task_signals.go:179] [ 1030: 1033] Restarting syscall 202: interrupted by signal 23 D0713 05:28:08.655360 700060 task_signals.go:220] [ 1030: 1033] Signal 23: delivering to handler D0713 05:28:08.655549 700060 task_signals.go:470] [ 1030: 1030] Notified of signal 23 D0713 05:28:08.655699 700060 task_signals.go:220] [ 1030: 1030] Signal 23: delivering to handler D0713 05:28:08.662105 700060 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.662138 700060 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000945ad0 13 D0713 05:28:08.662154 700060 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:08.666077 700060 task_signals.go:470] [ 1030: 1030] Notified of signal 23 D0713 05:28:08.666151 700060 task_signals.go:220] [ 1030: 1030] Signal 23: delivering to handler D0713 05:28:08.671773 700060 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.671805 700060 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000945ad0 14 D0713 05:28:08.671823 700060 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:08.671882 700060 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.671906 700060 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.671931 700060 task_signals.go:204] [ 1030: 1031] Signal 1030, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.671960 700060 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.671969 700060 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.671974 700060 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.671991 700060 task_signals.go:204] [ 1030: 1032] Signal 1030, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.672001 700060 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.672016 700060 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.672035 700060 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.672053 700060 task_signals.go:204] [ 1030: 1033] Signal 1030, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.672063 700060 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.672081 700060 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.672087 700060 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.672099 700060 task_signals.go:204] [ 1030: 1034] Signal 1030, PID: 1034, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.672107 700060 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.673169 700060 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.673206 700060 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.673222 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.673246 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.673254 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.673452 700060 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.674221 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.675860 700060 syscalls.go:262] [ 1035: 1035] Allocating stack with size of 8388608 bytes D0713 05:28:08.676012 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.677094 700060 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.677133 700060 usertrap_amd64.go:106] [ 1035: 1035] Map a usertrap vma at 63000 D0713 05:28:08.677217 700060 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc0001f9d40 1 D0713 05:28:08.677244 700060 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:08.677607 700060 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.677621 700060 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc0001f9d40 2 D0713 05:28:08.677629 700060 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:08.678034 700060 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.678053 700060 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc0001f9d40 3 D0713 05:28:08.678059 700060 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:08.683542 700060 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.683572 700060 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc0001f9d40 4 D0713 05:28:08.683584 700060 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:08.684683 700060 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.684716 700060 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc0001f9d40 5 D0713 05:28:08.684730 700060 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:08.684782 700060 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.684788 700060 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc0001f9d40 6 D0713 05:28:08.684794 700060 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:08.685181 700060 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.685210 700060 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc0001f9d40 7 D0713 05:28:08.685221 700060 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:08.685454 700060 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.685484 700060 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc0001f9d40 8 D0713 05:28:08.685512 700060 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:08.685802 700060 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.685834 700060 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc0001f9d40 9 D0713 05:28:08.685855 700060 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:08.685915 700060 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.685937 700060 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc0001f9d40 10 D0713 05:28:08.685949 700060 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:08.686917 700060 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.686997 700060 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc0001f9d40 11 D0713 05:28:08.687073 700060 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:08.687235 700060 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.687263 700060 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc0001f9d40 12 D0713 05:28:08.687278 700060 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:08.687333 700060 task_signals.go:470] [ 1035: 1035] Notified of signal 23 D0713 05:28:08.689277 700060 task_signals.go:220] [ 1035: 1035] Signal 23: delivering to handler D0713 05:28:08.693782 700060 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.693802 700060 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc0001f9d40 13 D0713 05:28:08.693817 700060 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:08.699521 700060 task_signals.go:470] [ 1035: 1035] Notified of signal 23 D0713 05:28:08.700454 700060 task_signals.go:220] [ 1035: 1035] Signal 23: delivering to handler D0713 05:28:08.701137 700060 task_signals.go:470] [ 1035: 1035] Notified of signal 23 D0713 05:28:08.702069 700060 task_signals.go:220] [ 1035: 1035] Signal 23: delivering to handler D0713 05:28:08.702210 700060 task_signals.go:481] [ 1035: 1035] No task notified of signal 23 D0713 05:28:08.702228 700060 task_signals.go:220] [ 1035: 1035] Signal 23: delivering to handler D0713 05:28:08.706328 700060 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.706375 700060 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc0001f9d40 14 D0713 05:28:08.706389 700060 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:08.706451 700060 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.706479 700060 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.706502 700060 task_signals.go:204] [ 1035: 1038] Signal 1035, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.706499 700060 task_signals.go:204] [ 1035: 1037] Signal 1035, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.706522 700060 task_signals.go:204] [ 1035: 1036] Signal 1035, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.706525 700060 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.706569 700060 task_signals.go:204] [ 1035: 1039] Signal 1035, PID: 1039, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.706602 700060 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.706623 700060 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.706632 700060 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.706647 700060 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.706657 700060 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.706672 700060 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.706695 700060 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.706805 700060 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.706822 700060 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.707719 700060 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.707753 700060 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.707767 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.707790 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.707803 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.707915 700060 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.708664 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.710299 700060 syscalls.go:262] [ 1040: 1040] Allocating stack with size of 8388608 bytes D0713 05:28:08.710407 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.711192 700060 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.711227 700060 usertrap_amd64.go:106] [ 1040: 1040] Map a usertrap vma at 62000 D0713 05:28:08.711376 700060 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0008689f0 1 D0713 05:28:08.711438 700060 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:08.711799 700060 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.711818 700060 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0008689f0 2 D0713 05:28:08.711826 700060 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:08.712450 700060 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.712469 700060 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0008689f0 3 D0713 05:28:08.712476 700060 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:08.717745 700060 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.717777 700060 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0008689f0 4 D0713 05:28:08.717788 700060 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:08.718814 700060 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.718836 700060 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0008689f0 5 D0713 05:28:08.718849 700060 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:08.718961 700060 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.718980 700060 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0008689f0 6 D0713 05:28:08.718996 700060 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:08.719213 700060 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.719231 700060 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0008689f0 7 D0713 05:28:08.719237 700060 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:08.719338 700060 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.719364 700060 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0008689f0 8 D0713 05:28:08.719374 700060 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:08.719450 700060 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.719466 700060 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0008689f0 9 D0713 05:28:08.719472 700060 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:08.719533 700060 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.719563 700060 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0008689f0 10 D0713 05:28:08.719575 700060 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b020 trap addr 62320 ([184 39 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:08.719618 700060 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.719641 700060 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0008689f0 11 D0713 05:28:08.719651 700060 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b04f trap addr 62370 ([184 234 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:08.719771 700060 task_signals.go:481] [ 1040: 1040] No task notified of signal 23 D0713 05:28:08.719900 700060 task_signals.go:220] [ 1040: 1040] Signal 23: delivering to handler D0713 05:28:08.719950 700060 usertrap_amd64.go:212] [ 1040: 1043] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.719959 700060 usertrap_amd64.go:122] [ 1040: 1043] Allocate a new trap: 0xc0008689f0 12 D0713 05:28:08.719966 700060 usertrap_amd64.go:225] [ 1040: 1043] Apply the binary patch addr 46b57c trap addr 623c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:08.728290 700060 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.728317 700060 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0008689f0 13 D0713 05:28:08.728329 700060 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:08.730574 700060 task_signals.go:470] [ 1040: 1040] Notified of signal 23 D0713 05:28:08.730715 700060 task_signals.go:220] [ 1040: 1040] Signal 23: delivering to handler D0713 05:28:08.737848 700060 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.737869 700060 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0008689f0 14 D0713 05:28:08.737881 700060 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:08.737963 700060 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.737999 700060 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.738013 700060 task_signals.go:204] [ 1040: 1043] Signal 1040, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.738020 700060 task_signals.go:204] [ 1040: 1044] Signal 1040, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.738032 700060 task_signals.go:204] [ 1040: 1045] Signal 1040, PID: 1045, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.738043 700060 task_signals.go:204] [ 1040: 1042] Signal 1040, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.738053 700060 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.738090 700060 task_signals.go:204] [ 1040: 1041] Signal 1040, PID: 1041, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.738107 700060 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.738114 700060 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.738128 700060 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.738136 700060 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.738153 700060 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.738163 700060 task_exit.go:204] [ 1040: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.738168 700060 task_exit.go:204] [ 1040: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.738171 700060 task_exit.go:204] [ 1040: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.738180 700060 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.738187 700060 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.738193 700060 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.738203 700060 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.739168 700060 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.739195 700060 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.739211 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.739315 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.739354 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.739449 700060 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.740135 700060 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.741592 700060 syscalls.go:262] [ 1046: 1046] Allocating stack with size of 8388608 bytes D0713 05:28:08.741688 700060 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.742414 700060 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.742461 700060 usertrap_amd64.go:106] [ 1046: 1046] Map a usertrap vma at 64000 D0713 05:28:08.742598 700060 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000868c00 1 D0713 05:28:08.742637 700060 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:08.742827 700060 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.742841 700060 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000868c00 2 D0713 05:28:08.742847 700060 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:08.743326 700060 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.743362 700060 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000868c00 3 D0713 05:28:08.743377 700060 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:08.748600 700060 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.748618 700060 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000868c00 4 D0713 05:28:08.748630 700060 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:08.749629 700060 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.749653 700060 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000868c00 5 D0713 05:28:08.749661 700060 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:08.749723 700060 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.749729 700060 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000868c00 6 D0713 05:28:08.749737 700060 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:08.750098 700060 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.750125 700060 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000868c00 7 D0713 05:28:08.750137 700060 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:08.750329 700060 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.750376 700060 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc000868c00 8 D0713 05:28:08.750391 700060 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:08.750517 700060 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.750566 700060 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc000868c00 9 D0713 05:28:08.750632 700060 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:08.750654 700060 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.750660 700060 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000868c00 10 D0713 05:28:08.750667 700060 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:08.757179 700060 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.757210 700060 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000868c00 11 D0713 05:28:08.757222 700060 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:08.761457 700060 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.761501 700060 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc000868c00 12 D0713 05:28:08.761518 700060 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:08.761570 700060 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.761582 700060 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc000868c00 13 D0713 05:28:08.761588 700060 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:08.761631 700060 task_signals.go:470] [ 1046: 1046] Notified of signal 23 D0713 05:28:08.761663 700060 task_signals.go:220] [ 1046: 1046] Signal 23: delivering to handler I0713 05:28:08.766079 700060 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0713 05:28:08.766135 700060 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.766147 700060 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000868c00 14 D0713 05:28:08.766158 700060 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:08.766212 700060 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.766238 700060 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.766261 700060 task_signals.go:204] [ 1046: 1049] Signal 1046, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.766256 700060 task_signals.go:204] [ 1046: 1048] Signal 1046, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.766284 700060 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.766282 700060 task_signals.go:204] [ 1046: 1047] Signal 1046, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.766292 700060 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.766302 700060 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.766371 700060 task_signals.go:204] [ 1046: 1050] Signal 1046, PID: 1050, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.766392 700060 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.766429 700060 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.766446 700060 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.766468 700060 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.766490 700060 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.766506 700060 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.766515 700060 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.767370 700060 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.767395 700060 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.767410 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.767442 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.767455 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.767547 700060 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.768100 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.769393 700060 syscalls.go:262] [ 1051: 1051] Allocating stack with size of 8388608 bytes D0713 05:28:08.769504 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.770344 700060 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.770373 700060 usertrap_amd64.go:106] [ 1051: 1051] Map a usertrap vma at 69000 D0713 05:28:08.770427 700060 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0009600f0 1 D0713 05:28:08.770446 700060 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:08.770748 700060 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.770771 700060 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0009600f0 2 D0713 05:28:08.770818 700060 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:08.771149 700060 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.771172 700060 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0009600f0 3 D0713 05:28:08.771182 700060 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:08.775517 700060 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.775543 700060 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0009600f0 4 D0713 05:28:08.775552 700060 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:08.776680 700060 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.776705 700060 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0009600f0 5 D0713 05:28:08.776715 700060 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:08.776752 700060 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.776768 700060 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0009600f0 6 D0713 05:28:08.776777 700060 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:08.777056 700060 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.777081 700060 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0009600f0 7 D0713 05:28:08.777089 700060 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:08.777294 700060 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.777315 700060 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc0009600f0 8 D0713 05:28:08.777324 700060 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:08.777547 700060 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.777573 700060 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc0009600f0 9 D0713 05:28:08.777591 700060 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:08.777730 700060 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.777744 700060 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0009600f0 10 D0713 05:28:08.777754 700060 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:08.784234 700060 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.784259 700060 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0009600f0 11 D0713 05:28:08.784272 700060 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:08.787974 700060 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.788007 700060 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc0009600f0 12 D0713 05:28:08.788019 700060 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:08.788077 700060 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.788107 700060 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0009600f0 13 D0713 05:28:08.788118 700060 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b6e0 trap addr 69410 ([184 24 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:08.788178 700060 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.788216 700060 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc0009600f0 14 D0713 05:28:08.788229 700060 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:08.788265 700060 task_signals.go:470] [ 1051: 1051] Notified of signal 23 D0713 05:28:08.788325 700060 task_signals.go:220] [ 1051: 1051] Signal 23: delivering to handler I0713 05:28:08.793027 700060 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0713 05:28:08.793092 700060 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.793099 700060 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0009600f0 15 D0713 05:28:08.793106 700060 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 05:28:08.793143 700060 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.793169 700060 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.793185 700060 task_signals.go:204] [ 1051: 1054] Signal 1051, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.793211 700060 task_signals.go:204] [ 1051: 1055] Signal 1051, PID: 1055, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.793235 700060 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.793232 700060 task_signals.go:204] [ 1051: 1053] Signal 1051, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.793260 700060 task_signals.go:204] [ 1051: 1056] Signal 1051, PID: 1056, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.793289 700060 task_signals.go:204] [ 1051: 1052] Signal 1051, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.793311 700060 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.793319 700060 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.793332 700060 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.793354 700060 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.793362 700060 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.793372 700060 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.793380 700060 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.793386 700060 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.793395 700060 task_exit.go:204] [ 1051: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.793416 700060 task_exit.go:204] [ 1051: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.793431 700060 task_exit.go:204] [ 1051: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.793441 700060 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.794292 700060 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.794324 700060 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.794339 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.794362 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.794381 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.794448 700060 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.794998 700060 task_stop.go:118] [ 5: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.796491 700060 syscalls.go:262] [ 1057: 1057] Allocating stack with size of 8388608 bytes D0713 05:28:08.796858 700060 task_stop.go:138] [ 5: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.797936 700060 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.797971 700060 usertrap_amd64.go:106] [ 1057: 1057] Map a usertrap vma at 66000 D0713 05:28:08.798058 700060 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0009af140 1 D0713 05:28:08.798091 700060 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:08.798412 700060 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.798434 700060 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0009af140 2 D0713 05:28:08.798443 700060 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:08.798762 700060 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.798781 700060 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0009af140 3 D0713 05:28:08.798789 700060 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:08.804326 700060 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.804357 700060 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0009af140 4 D0713 05:28:08.804369 700060 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:08.805478 700060 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.805495 700060 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0009af140 5 D0713 05:28:08.805505 700060 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:08.805556 700060 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.805573 700060 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0009af140 6 D0713 05:28:08.805582 700060 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:08.806044 700060 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.806072 700060 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0009af140 7 D0713 05:28:08.806092 700060 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:08.806239 700060 usertrap_amd64.go:212] [ 1057: 1058] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.806259 700060 usertrap_amd64.go:122] [ 1057: 1058] Allocate a new trap: 0xc0009af140 8 D0713 05:28:08.806268 700060 usertrap_amd64.go:225] [ 1057: 1058] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:08.806388 700060 usertrap_amd64.go:212] [ 1057: 1058] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.806473 700060 usertrap_amd64.go:122] [ 1057: 1058] Allocate a new trap: 0xc0009af140 9 D0713 05:28:08.806512 700060 usertrap_amd64.go:225] [ 1057: 1058] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:08.806621 700060 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.806646 700060 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0009af140 10 D0713 05:28:08.806656 700060 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:08.806762 700060 usertrap_amd64.go:212] [ 1057: 1058] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.806787 700060 usertrap_amd64.go:122] [ 1057: 1058] Allocate a new trap: 0xc0009af140 11 D0713 05:28:08.806798 700060 usertrap_amd64.go:225] [ 1057: 1058] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:08.806861 700060 usertrap_amd64.go:212] [ 1057: 1058] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.806881 700060 usertrap_amd64.go:122] [ 1057: 1058] Allocate a new trap: 0xc0009af140 12 D0713 05:28:08.806891 700060 usertrap_amd64.go:225] [ 1057: 1058] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:08.806938 700060 task_signals.go:470] [ 1057: 1060] Notified of signal 23 D0713 05:28:08.807670 700060 task_signals.go:220] [ 1057: 1060] Signal 23: delivering to handler D0713 05:28:08.813728 700060 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.813754 700060 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0009af140 13 D0713 05:28:08.813762 700060 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:08.819045 700060 task_signals.go:470] [ 1057: 1057] Notified of signal 23 D0713 05:28:08.819175 700060 task_signals.go:220] [ 1057: 1057] Signal 23: delivering to handler I0713 05:28:08.822584 700060 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0713 05:28:08.822693 700060 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.822713 700060 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0009af140 14 D0713 05:28:08.822726 700060 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:08.822833 700060 task_exit.go:204] [ 1057: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.822855 700060 task_exit.go:204] [ 1057: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.822878 700060 task_signals.go:204] [ 1057: 1060] Signal 1057, PID: 1060, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.822903 700060 task_exit.go:204] [ 1057: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.822890 700060 task_signals.go:204] [ 1057: 1059] Signal 1057, PID: 1059, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.822955 700060 task_signals.go:204] [ 1057: 1061] Signal 1057, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.822973 700060 task_exit.go:204] [ 1057: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.822983 700060 task_exit.go:204] [ 1057: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.822958 700060 task_signals.go:204] [ 1057: 1058] Signal 1057, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.822999 700060 task_exit.go:204] [ 1057: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.823012 700060 task_exit.go:204] [ 1057: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.823018 700060 task_exit.go:204] [ 1057: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.823030 700060 task_exit.go:204] [ 1057: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.823057 700060 task_exit.go:204] [ 1057: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.823082 700060 task_exit.go:204] [ 1057: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.823095 700060 task_exit.go:204] [ 1057: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.824145 700060 task_exit.go:204] [ 1057: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.824178 700060 task_exit.go:204] [ 1057: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.824188 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.824208 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.824213 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.824341 700060 task_exit.go:204] [ 1057: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.825215 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.827354 700060 syscalls.go:262] [ 1062: 1062] Allocating stack with size of 8388608 bytes D0713 05:28:08.827553 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.828634 700060 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.828671 700060 usertrap_amd64.go:106] [ 1062: 1062] Map a usertrap vma at 64000 D0713 05:28:08.828777 700060 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc000960450 1 D0713 05:28:08.828849 700060 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:08.829467 700060 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.829528 700060 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc000960450 2 D0713 05:28:08.829546 700060 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:08.830318 700060 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.830346 700060 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc000960450 3 D0713 05:28:08.830358 700060 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:08.836243 700060 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.836273 700060 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc000960450 4 D0713 05:28:08.836288 700060 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:08.837407 700060 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.837448 700060 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc000960450 5 D0713 05:28:08.837462 700060 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:08.837519 700060 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.837534 700060 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc000960450 6 D0713 05:28:08.837539 700060 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:08.837851 700060 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.837869 700060 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc000960450 7 D0713 05:28:08.837875 700060 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:08.837998 700060 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.838020 700060 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc000960450 8 D0713 05:28:08.838026 700060 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:08.838223 700060 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.838254 700060 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc000960450 9 D0713 05:28:08.838270 700060 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:08.838358 700060 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.838389 700060 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc000960450 10 D0713 05:28:08.838402 700060 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:08.845286 700060 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.845305 700060 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc000960450 11 D0713 05:28:08.845316 700060 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:08.849149 700060 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.849188 700060 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc000960450 12 D0713 05:28:08.849250 700060 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:08.849317 700060 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.849326 700060 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc000960450 13 D0713 05:28:08.849336 700060 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:08.849352 700060 task_signals.go:470] [ 1062: 1062] Notified of signal 23 D0713 05:28:08.849372 700060 task_signals.go:179] [ 1062: 1062] Restarting syscall 202: interrupted by signal 23 D0713 05:28:08.849383 700060 task_signals.go:220] [ 1062: 1062] Signal 23: delivering to handler I0713 05:28:08.854999 700060 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0713 05:28:08.855049 700060 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.855056 700060 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc000960450 14 D0713 05:28:08.855063 700060 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:08.855086 700060 task_exit.go:204] [ 1062: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.855119 700060 task_exit.go:204] [ 1062: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.855133 700060 task_signals.go:204] [ 1062: 1063] Signal 1062, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.855152 700060 task_signals.go:204] [ 1062: 1064] Signal 1062, PID: 1064, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.855160 700060 task_exit.go:204] [ 1062: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.855142 700060 task_signals.go:204] [ 1062: 1065] Signal 1062, PID: 1065, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.855167 700060 task_exit.go:204] [ 1062: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.855176 700060 task_exit.go:204] [ 1062: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.855182 700060 task_exit.go:204] [ 1062: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.855208 700060 task_signals.go:204] [ 1062: 1066] Signal 1062, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.855239 700060 task_signals.go:204] [ 1062: 1067] Signal 1062, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.855251 700060 task_exit.go:204] [ 1062: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.855267 700060 task_exit.go:204] [ 1062: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.855277 700060 task_exit.go:204] [ 1062: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.855294 700060 task_exit.go:204] [ 1062: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.855297 700060 task_exit.go:204] [ 1062: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.855305 700060 task_exit.go:204] [ 1062: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.855311 700060 task_exit.go:204] [ 1062: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.855314 700060 task_exit.go:204] [ 1062: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.855319 700060 task_exit.go:204] [ 1062: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.856375 700060 task_exit.go:204] [ 1062: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.856404 700060 task_exit.go:204] [ 1062: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.856415 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.856441 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.856450 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.856570 700060 task_exit.go:204] [ 1062: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.857550 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.858794 700060 syscalls.go:262] [ 1068: 1068] Allocating stack with size of 8388608 bytes D0713 05:28:08.858895 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.859803 700060 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.859829 700060 usertrap_amd64.go:106] [ 1068: 1068] Map a usertrap vma at 69000 D0713 05:28:08.859903 700060 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000c254a0 1 D0713 05:28:08.859929 700060 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:08.860331 700060 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.860375 700060 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000c254a0 2 D0713 05:28:08.860388 700060 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:08.861073 700060 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.861103 700060 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000c254a0 3 D0713 05:28:08.861115 700060 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:08.865807 700060 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.865834 700060 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000c254a0 4 D0713 05:28:08.865842 700060 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:08.867068 700060 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.867113 700060 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000c254a0 5 D0713 05:28:08.867121 700060 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:08.867179 700060 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.867192 700060 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000c254a0 6 D0713 05:28:08.867199 700060 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:08.867685 700060 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.867710 700060 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000c254a0 7 D0713 05:28:08.867720 700060 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:08.867877 700060 usertrap_amd64.go:212] [ 1068: 1069] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.867906 700060 usertrap_amd64.go:122] [ 1068: 1069] Allocate a new trap: 0xc000c254a0 8 D0713 05:28:08.867913 700060 usertrap_amd64.go:225] [ 1068: 1069] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:08.868095 700060 usertrap_amd64.go:212] [ 1068: 1069] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.868191 700060 usertrap_amd64.go:122] [ 1068: 1069] Allocate a new trap: 0xc000c254a0 9 D0713 05:28:08.868253 700060 usertrap_amd64.go:225] [ 1068: 1069] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:08.868270 700060 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.868278 700060 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000c254a0 10 D0713 05:28:08.868288 700060 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:08.868690 700060 usertrap_amd64.go:212] [ 1068: 1069] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.868773 700060 usertrap_amd64.go:122] [ 1068: 1069] Allocate a new trap: 0xc000c254a0 11 D0713 05:28:08.868855 700060 usertrap_amd64.go:225] [ 1068: 1069] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:08.868901 700060 usertrap_amd64.go:212] [ 1068: 1069] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.868912 700060 usertrap_amd64.go:122] [ 1068: 1069] Allocate a new trap: 0xc000c254a0 12 D0713 05:28:08.868920 700060 usertrap_amd64.go:225] [ 1068: 1069] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:08.868972 700060 task_signals.go:470] [ 1068: 1068] Notified of signal 23 D0713 05:28:08.868993 700060 task_signals.go:220] [ 1068: 1068] Signal 23: delivering to handler D0713 05:28:08.874352 700060 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.874430 700060 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000c254a0 13 D0713 05:28:08.874445 700060 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:08.879774 700060 task_signals.go:470] [ 1068: 1068] Notified of signal 23 D0713 05:28:08.879851 700060 task_signals.go:220] [ 1068: 1068] Signal 23: delivering to handler D0713 05:28:08.883333 700060 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.883371 700060 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000c254a0 14 D0713 05:28:08.883385 700060 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:08.883449 700060 task_exit.go:204] [ 1068: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.883571 700060 task_exit.go:204] [ 1068: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.883609 700060 task_signals.go:204] [ 1068: 1070] Signal 1068, PID: 1070, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.883639 700060 task_exit.go:204] [ 1068: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.883649 700060 task_exit.go:204] [ 1068: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.883655 700060 task_exit.go:204] [ 1068: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.883681 700060 task_signals.go:204] [ 1068: 1069] Signal 1068, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.883714 700060 task_signals.go:204] [ 1068: 1071] Signal 1068, PID: 1071, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.883728 700060 task_exit.go:204] [ 1068: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.883774 700060 task_signals.go:204] [ 1068: 1072] Signal 1068, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.883810 700060 task_exit.go:204] [ 1068: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.883834 700060 task_exit.go:204] [ 1068: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.883839 700060 task_exit.go:204] [ 1068: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.883851 700060 task_exit.go:204] [ 1068: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.883937 700060 task_exit.go:204] [ 1068: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.883958 700060 task_exit.go:204] [ 1068: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.884659 700060 task_exit.go:204] [ 1068: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.884717 700060 task_exit.go:204] [ 1068: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.884792 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.884858 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.884931 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.885070 700060 task_exit.go:204] [ 1068: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.885714 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.887123 700060 syscalls.go:262] [ 1073: 1073] Allocating stack with size of 8388608 bytes D0713 05:28:08.887225 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.888110 700060 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.888146 700060 usertrap_amd64.go:106] [ 1073: 1073] Map a usertrap vma at 69000 D0713 05:28:08.888221 700060 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc000960630 1 D0713 05:28:08.888250 700060 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:08.888640 700060 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.888670 700060 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc000960630 2 D0713 05:28:08.888681 700060 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:08.889292 700060 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.889317 700060 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc000960630 3 D0713 05:28:08.889327 700060 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:08.895142 700060 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.895170 700060 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc000960630 4 D0713 05:28:08.895179 700060 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:08.896326 700060 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.896348 700060 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc000960630 5 D0713 05:28:08.896355 700060 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:08.896405 700060 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.896427 700060 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc000960630 6 D0713 05:28:08.896432 700060 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:08.896669 700060 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.896690 700060 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc000960630 7 D0713 05:28:08.896697 700060 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:08.896770 700060 usertrap_amd64.go:212] [ 1073: 1074] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.896792 700060 usertrap_amd64.go:122] [ 1073: 1074] Allocate a new trap: 0xc000960630 8 D0713 05:28:08.896803 700060 usertrap_amd64.go:225] [ 1073: 1074] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:08.897176 700060 usertrap_amd64.go:212] [ 1073: 1074] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.897203 700060 usertrap_amd64.go:122] [ 1073: 1074] Allocate a new trap: 0xc000960630 9 D0713 05:28:08.897213 700060 usertrap_amd64.go:225] [ 1073: 1074] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:08.897227 700060 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.897234 700060 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc000960630 10 D0713 05:28:08.897243 700060 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:08.904485 700060 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.904530 700060 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc000960630 11 D0713 05:28:08.904544 700060 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:08.907983 700060 usertrap_amd64.go:212] [ 1073: 1074] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.908014 700060 usertrap_amd64.go:122] [ 1073: 1074] Allocate a new trap: 0xc000960630 12 D0713 05:28:08.908029 700060 usertrap_amd64.go:225] [ 1073: 1074] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:08.908100 700060 usertrap_amd64.go:212] [ 1073: 1074] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.908114 700060 usertrap_amd64.go:122] [ 1073: 1074] Allocate a new trap: 0xc000960630 13 D0713 05:28:08.908121 700060 usertrap_amd64.go:225] [ 1073: 1074] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:08.908163 700060 task_signals.go:470] [ 1073: 1073] Notified of signal 23 D0713 05:28:08.908260 700060 task_signals.go:220] [ 1073: 1073] Signal 23: delivering to handler D0713 05:28:08.913651 700060 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.913684 700060 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc000960630 14 D0713 05:28:08.913696 700060 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:08.913753 700060 task_exit.go:204] [ 1073: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.913774 700060 task_exit.go:204] [ 1073: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.913797 700060 task_signals.go:204] [ 1073: 1074] Signal 1073, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.913825 700060 task_exit.go:204] [ 1073: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.913834 700060 task_exit.go:204] [ 1073: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.913850 700060 task_exit.go:204] [ 1073: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.913872 700060 task_signals.go:204] [ 1073: 1075] Signal 1073, PID: 1075, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.913899 700060 task_exit.go:204] [ 1073: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.913906 700060 task_exit.go:204] [ 1073: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.913911 700060 task_exit.go:204] [ 1073: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.913930 700060 task_signals.go:204] [ 1073: 1076] Signal 1073, PID: 1076, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.913937 700060 task_exit.go:204] [ 1073: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.913942 700060 task_exit.go:204] [ 1073: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.913945 700060 task_exit.go:204] [ 1073: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.913954 700060 task_signals.go:204] [ 1073: 1077] Signal 1073, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.913975 700060 task_exit.go:204] [ 1073: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.915060 700060 task_exit.go:204] [ 1073: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.915101 700060 task_exit.go:204] [ 1073: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.915115 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.915159 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.915189 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.915278 700060 task_exit.go:204] [ 1073: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.915836 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.917319 700060 syscalls.go:262] [ 1078: 1078] Allocating stack with size of 8388608 bytes D0713 05:28:08.917429 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.919071 700060 usertrap_amd64.go:212] [ 1078: 1078] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.919108 700060 usertrap_amd64.go:106] [ 1078: 1078] Map a usertrap vma at 63000 D0713 05:28:08.919227 700060 usertrap_amd64.go:122] [ 1078: 1078] Allocate a new trap: 0xc000868de0 1 D0713 05:28:08.919260 700060 usertrap_amd64.go:225] [ 1078: 1078] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:08.919692 700060 usertrap_amd64.go:212] [ 1078: 1078] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.919715 700060 usertrap_amd64.go:122] [ 1078: 1078] Allocate a new trap: 0xc000868de0 2 D0713 05:28:08.919724 700060 usertrap_amd64.go:225] [ 1078: 1078] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:08.920234 700060 usertrap_amd64.go:212] [ 1078: 1078] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.920306 700060 usertrap_amd64.go:122] [ 1078: 1078] Allocate a new trap: 0xc000868de0 3 D0713 05:28:08.920322 700060 usertrap_amd64.go:225] [ 1078: 1078] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:08.927215 700060 usertrap_amd64.go:212] [ 1078: 1078] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.927269 700060 usertrap_amd64.go:122] [ 1078: 1078] Allocate a new trap: 0xc000868de0 4 D0713 05:28:08.927286 700060 usertrap_amd64.go:225] [ 1078: 1078] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:08.929084 700060 usertrap_amd64.go:212] [ 1078: 1078] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.929129 700060 usertrap_amd64.go:122] [ 1078: 1078] Allocate a new trap: 0xc000868de0 5 D0713 05:28:08.929147 700060 usertrap_amd64.go:225] [ 1078: 1078] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:08.929214 700060 usertrap_amd64.go:212] [ 1078: 1078] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.929221 700060 usertrap_amd64.go:122] [ 1078: 1078] Allocate a new trap: 0xc000868de0 6 D0713 05:28:08.929228 700060 usertrap_amd64.go:225] [ 1078: 1078] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:08.929545 700060 usertrap_amd64.go:212] [ 1078: 1078] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.929565 700060 usertrap_amd64.go:122] [ 1078: 1078] Allocate a new trap: 0xc000868de0 7 D0713 05:28:08.929575 700060 usertrap_amd64.go:225] [ 1078: 1078] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:08.929782 700060 usertrap_amd64.go:212] [ 1078: 1079] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.929809 700060 usertrap_amd64.go:122] [ 1078: 1079] Allocate a new trap: 0xc000868de0 8 D0713 05:28:08.929821 700060 usertrap_amd64.go:225] [ 1078: 1079] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:08.930113 700060 usertrap_amd64.go:212] [ 1078: 1079] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.930135 700060 usertrap_amd64.go:122] [ 1078: 1079] Allocate a new trap: 0xc000868de0 9 D0713 05:28:08.930147 700060 usertrap_amd64.go:225] [ 1078: 1079] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:08.930205 700060 usertrap_amd64.go:212] [ 1078: 1078] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.930285 700060 usertrap_amd64.go:122] [ 1078: 1078] Allocate a new trap: 0xc000868de0 10 D0713 05:28:08.930307 700060 usertrap_amd64.go:225] [ 1078: 1078] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:08.930360 700060 usertrap_amd64.go:212] [ 1078: 1079] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.930371 700060 usertrap_amd64.go:122] [ 1078: 1079] Allocate a new trap: 0xc000868de0 11 D0713 05:28:08.930382 700060 usertrap_amd64.go:225] [ 1078: 1079] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:08.930477 700060 usertrap_amd64.go:212] [ 1078: 1079] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.930504 700060 usertrap_amd64.go:122] [ 1078: 1079] Allocate a new trap: 0xc000868de0 12 D0713 05:28:08.930516 700060 usertrap_amd64.go:225] [ 1078: 1079] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:08.930613 700060 task_signals.go:470] [ 1078: 1081] Notified of signal 23 D0713 05:28:08.930662 700060 task_signals.go:179] [ 1078: 1081] Restarting syscall 202: interrupted by signal 23 D0713 05:28:08.930675 700060 task_signals.go:220] [ 1078: 1081] Signal 23: delivering to handler D0713 05:28:08.931047 700060 task_signals.go:470] [ 1078: 1078] Notified of signal 23 D0713 05:28:08.931074 700060 task_signals.go:220] [ 1078: 1078] Signal 23: delivering to handler D0713 05:28:08.937665 700060 usertrap_amd64.go:212] [ 1078: 1078] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.937704 700060 usertrap_amd64.go:122] [ 1078: 1078] Allocate a new trap: 0xc000868de0 13 D0713 05:28:08.937716 700060 usertrap_amd64.go:225] [ 1078: 1078] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:08.941776 700060 task_signals.go:470] [ 1078: 1078] Notified of signal 23 D0713 05:28:08.941831 700060 task_signals.go:179] [ 1078: 1078] Restarting syscall 202: interrupted by signal 23 D0713 05:28:08.941852 700060 task_signals.go:220] [ 1078: 1078] Signal 23: delivering to handler D0713 05:28:08.947735 700060 usertrap_amd64.go:212] [ 1078: 1078] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.947769 700060 usertrap_amd64.go:122] [ 1078: 1078] Allocate a new trap: 0xc000868de0 14 D0713 05:28:08.947785 700060 usertrap_amd64.go:225] [ 1078: 1078] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:08.947823 700060 task_exit.go:204] [ 1078: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.947849 700060 task_exit.go:204] [ 1078: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.947853 700060 task_signals.go:204] [ 1078: 1080] Signal 1078, PID: 1080, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.947872 700060 task_signals.go:204] [ 1078: 1082] Signal 1078, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.947880 700060 task_exit.go:204] [ 1078: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.947877 700060 task_signals.go:204] [ 1078: 1081] Signal 1078, PID: 1081, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.947900 700060 task_exit.go:204] [ 1078: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.947906 700060 task_exit.go:204] [ 1078: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.947922 700060 task_exit.go:204] [ 1078: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.947931 700060 task_exit.go:204] [ 1078: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.947922 700060 task_signals.go:204] [ 1078: 1079] Signal 1078, PID: 1079, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.947937 700060 task_exit.go:204] [ 1078: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.947954 700060 task_exit.go:204] [ 1078: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.947969 700060 task_exit.go:204] [ 1078: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.947997 700060 task_exit.go:204] [ 1078: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.948009 700060 task_exit.go:204] [ 1078: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.948990 700060 task_exit.go:204] [ 1078: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.949013 700060 task_exit.go:204] [ 1078: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.949032 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.949052 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.949059 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.949177 700060 task_exit.go:204] [ 1078: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.949934 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.951281 700060 syscalls.go:262] [ 1083: 1083] Allocating stack with size of 8388608 bytes D0713 05:28:08.951454 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.952154 700060 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.952194 700060 usertrap_amd64.go:106] [ 1083: 1083] Map a usertrap vma at 66000 D0713 05:28:08.952312 700060 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc0019cbc20 1 D0713 05:28:08.952335 700060 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:08.952654 700060 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.952675 700060 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc0019cbc20 2 D0713 05:28:08.952683 700060 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:08.953193 700060 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.953215 700060 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc0019cbc20 3 D0713 05:28:08.953232 700060 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:08.958863 700060 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.958889 700060 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc0019cbc20 4 D0713 05:28:08.958903 700060 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:08.959974 700060 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.960009 700060 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc0019cbc20 5 D0713 05:28:08.960022 700060 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:08.960072 700060 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.960089 700060 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc0019cbc20 6 D0713 05:28:08.960099 700060 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:08.960436 700060 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.960462 700060 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc0019cbc20 7 D0713 05:28:08.960473 700060 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:08.960588 700060 usertrap_amd64.go:212] [ 1083: 1084] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.960599 700060 usertrap_amd64.go:122] [ 1083: 1084] Allocate a new trap: 0xc0019cbc20 8 D0713 05:28:08.960609 700060 usertrap_amd64.go:225] [ 1083: 1084] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:08.960767 700060 usertrap_amd64.go:212] [ 1083: 1084] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.961010 700060 usertrap_amd64.go:122] [ 1083: 1084] Allocate a new trap: 0xc0019cbc20 9 D0713 05:28:08.961082 700060 usertrap_amd64.go:225] [ 1083: 1084] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:08.961100 700060 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.961108 700060 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc0019cbc20 10 D0713 05:28:08.961116 700060 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:08.967966 700060 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.968024 700060 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc0019cbc20 11 D0713 05:28:08.968040 700060 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:08.971705 700060 usertrap_amd64.go:212] [ 1083: 1084] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.971732 700060 usertrap_amd64.go:122] [ 1083: 1084] Allocate a new trap: 0xc0019cbc20 12 D0713 05:28:08.971745 700060 usertrap_amd64.go:225] [ 1083: 1084] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:08.971875 700060 usertrap_amd64.go:212] [ 1083: 1084] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.971901 700060 usertrap_amd64.go:122] [ 1083: 1084] Allocate a new trap: 0xc0019cbc20 13 D0713 05:28:08.971911 700060 usertrap_amd64.go:225] [ 1083: 1084] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:08.971955 700060 task_signals.go:470] [ 1083: 1083] Notified of signal 23 D0713 05:28:08.972025 700060 task_signals.go:220] [ 1083: 1083] Signal 23: delivering to handler D0713 05:28:08.977731 700060 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.977765 700060 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc0019cbc20 14 D0713 05:28:08.977776 700060 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:08.977830 700060 task_exit.go:204] [ 1083: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.977848 700060 task_exit.go:204] [ 1083: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.977874 700060 task_signals.go:204] [ 1083: 1086] Signal 1083, PID: 1086, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.977875 700060 task_signals.go:204] [ 1083: 1085] Signal 1083, PID: 1085, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.977893 700060 task_exit.go:204] [ 1083: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.977911 700060 task_exit.go:204] [ 1083: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.977921 700060 task_exit.go:204] [ 1083: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.977942 700060 task_exit.go:204] [ 1083: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.977964 700060 task_signals.go:204] [ 1083: 1087] Signal 1083, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.977982 700060 task_signals.go:204] [ 1083: 1084] Signal 1083, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.977984 700060 task_exit.go:204] [ 1083: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.977996 700060 task_exit.go:204] [ 1083: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.978010 700060 task_exit.go:204] [ 1083: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.978019 700060 task_exit.go:204] [ 1083: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.978026 700060 task_exit.go:204] [ 1083: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.978034 700060 task_exit.go:204] [ 1083: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.978905 700060 task_exit.go:204] [ 1083: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.978935 700060 task_exit.go:204] [ 1083: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.978949 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:08.979026 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.979058 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:08.979123 700060 task_exit.go:204] [ 1083: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.979192 700060 task_signals.go:470] [ 5: 7] Notified of signal 23 D0713 05:28:08.979258 700060 task_signals.go:220] [ 5: 7] Signal 23: delivering to handler D0713 05:28:08.980011 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.982595 700060 syscalls.go:262] [ 1088: 1088] Allocating stack with size of 8388608 bytes D0713 05:28:08.982797 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.983790 700060 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.983832 700060 usertrap_amd64.go:106] [ 1088: 1088] Map a usertrap vma at 60000 D0713 05:28:08.983912 700060 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000c25a40 1 D0713 05:28:08.983946 700060 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:08.984149 700060 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.984174 700060 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000c25a40 2 D0713 05:28:08.984180 700060 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:08.984626 700060 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.984660 700060 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000c25a40 3 D0713 05:28:08.984666 700060 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:08.990592 700060 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.990644 700060 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000c25a40 4 D0713 05:28:08.990656 700060 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:08.991673 700060 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.991700 700060 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000c25a40 5 D0713 05:28:08.991714 700060 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:08.991766 700060 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.991777 700060 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000c25a40 6 D0713 05:28:08.991789 700060 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:08.992035 700060 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.992054 700060 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000c25a40 7 D0713 05:28:08.992066 700060 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:08.992245 700060 usertrap_amd64.go:212] [ 1088: 1089] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.992280 700060 usertrap_amd64.go:122] [ 1088: 1089] Allocate a new trap: 0xc000c25a40 8 D0713 05:28:08.992289 700060 usertrap_amd64.go:225] [ 1088: 1089] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:08.992521 700060 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.992609 700060 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000c25a40 9 D0713 05:28:08.992713 700060 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:08.992754 700060 usertrap_amd64.go:212] [ 1088: 1089] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.992764 700060 usertrap_amd64.go:122] [ 1088: 1089] Allocate a new trap: 0xc000c25a40 10 D0713 05:28:08.992775 700060 usertrap_amd64.go:225] [ 1088: 1089] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:08.999794 700060 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.999839 700060 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000c25a40 11 D0713 05:28:08.999852 700060 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:09.003590 700060 usertrap_amd64.go:212] [ 1088: 1089] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.003631 700060 usertrap_amd64.go:122] [ 1088: 1089] Allocate a new trap: 0xc000c25a40 12 D0713 05:28:09.003647 700060 usertrap_amd64.go:225] [ 1088: 1089] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:09.003795 700060 usertrap_amd64.go:212] [ 1088: 1089] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.003855 700060 usertrap_amd64.go:122] [ 1088: 1089] Allocate a new trap: 0xc000c25a40 13 D0713 05:28:09.003899 700060 usertrap_amd64.go:225] [ 1088: 1089] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:09.003953 700060 task_signals.go:470] [ 1088: 1088] Notified of signal 23 D0713 05:28:09.004031 700060 task_signals.go:220] [ 1088: 1088] Signal 23: delivering to handler D0713 05:28:09.010776 700060 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.010819 700060 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc000c25a40 14 D0713 05:28:09.010860 700060 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:09.011252 700060 task_exit.go:204] [ 1088: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.011394 700060 task_exit.go:204] [ 1088: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.011463 700060 task_signals.go:204] [ 1088: 1089] Signal 1088, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.011489 700060 task_exit.go:204] [ 1088: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.011501 700060 task_exit.go:204] [ 1088: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.011506 700060 task_exit.go:204] [ 1088: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.011535 700060 task_signals.go:204] [ 1088: 1090] Signal 1088, PID: 1090, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.011548 700060 task_exit.go:204] [ 1088: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.011556 700060 task_exit.go:204] [ 1088: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.011576 700060 task_exit.go:204] [ 1088: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.011594 700060 task_signals.go:204] [ 1088: 1091] Signal 1088, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.011612 700060 task_exit.go:204] [ 1088: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.011620 700060 task_exit.go:204] [ 1088: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.011634 700060 task_exit.go:204] [ 1088: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.011664 700060 task_signals.go:204] [ 1088: 1092] Signal 1088, PID: 1092, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.011696 700060 task_exit.go:204] [ 1088: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.011705 700060 task_exit.go:204] [ 1088: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.011711 700060 task_exit.go:204] [ 1088: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.011724 700060 task_signals.go:204] [ 1088: 1093] Signal 1088, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.011735 700060 task_exit.go:204] [ 1088: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.013182 700060 task_exit.go:204] [ 1088: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.013210 700060 task_exit.go:204] [ 1088: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.013295 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.013432 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.013457 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.013523 700060 task_exit.go:204] [ 1088: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.014472 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.016236 700060 syscalls.go:262] [ 1094: 1094] Allocating stack with size of 8388608 bytes D0713 05:28:09.016435 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.017330 700060 usertrap_amd64.go:212] [ 1094: 1094] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.017378 700060 usertrap_amd64.go:106] [ 1094: 1094] Map a usertrap vma at 65000 D0713 05:28:09.017535 700060 usertrap_amd64.go:122] [ 1094: 1094] Allocate a new trap: 0xc0009aff20 1 D0713 05:28:09.017571 700060 usertrap_amd64.go:225] [ 1094: 1094] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:09.018252 700060 usertrap_amd64.go:212] [ 1094: 1094] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.018277 700060 usertrap_amd64.go:122] [ 1094: 1094] Allocate a new trap: 0xc0009aff20 2 D0713 05:28:09.018290 700060 usertrap_amd64.go:225] [ 1094: 1094] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:09.018934 700060 usertrap_amd64.go:212] [ 1094: 1094] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.018991 700060 usertrap_amd64.go:122] [ 1094: 1094] Allocate a new trap: 0xc0009aff20 3 D0713 05:28:09.019006 700060 usertrap_amd64.go:225] [ 1094: 1094] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:09.025288 700060 usertrap_amd64.go:212] [ 1094: 1094] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.025323 700060 usertrap_amd64.go:122] [ 1094: 1094] Allocate a new trap: 0xc0009aff20 4 D0713 05:28:09.025340 700060 usertrap_amd64.go:225] [ 1094: 1094] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:09.026761 700060 usertrap_amd64.go:212] [ 1094: 1094] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.026803 700060 usertrap_amd64.go:122] [ 1094: 1094] Allocate a new trap: 0xc0009aff20 5 D0713 05:28:09.026817 700060 usertrap_amd64.go:225] [ 1094: 1094] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:09.026876 700060 usertrap_amd64.go:212] [ 1094: 1094] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.026885 700060 usertrap_amd64.go:122] [ 1094: 1094] Allocate a new trap: 0xc0009aff20 6 D0713 05:28:09.026892 700060 usertrap_amd64.go:225] [ 1094: 1094] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:09.029934 700060 usertrap_amd64.go:212] [ 1094: 1094] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.029963 700060 usertrap_amd64.go:122] [ 1094: 1094] Allocate a new trap: 0xc0009aff20 7 D0713 05:28:09.029986 700060 usertrap_amd64.go:225] [ 1094: 1094] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:09.030170 700060 usertrap_amd64.go:212] [ 1094: 1095] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.030217 700060 usertrap_amd64.go:122] [ 1094: 1095] Allocate a new trap: 0xc0009aff20 8 D0713 05:28:09.030231 700060 usertrap_amd64.go:225] [ 1094: 1095] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:09.030583 700060 usertrap_amd64.go:212] [ 1094: 1094] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.030604 700060 usertrap_amd64.go:122] [ 1094: 1094] Allocate a new trap: 0xc0009aff20 9 D0713 05:28:09.030612 700060 usertrap_amd64.go:225] [ 1094: 1094] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:09.030625 700060 usertrap_amd64.go:212] [ 1094: 1095] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.030629 700060 usertrap_amd64.go:122] [ 1094: 1095] Allocate a new trap: 0xc0009aff20 10 D0713 05:28:09.030733 700060 usertrap_amd64.go:225] [ 1094: 1095] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:09.036821 700060 usertrap_amd64.go:212] [ 1094: 1094] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.036854 700060 usertrap_amd64.go:122] [ 1094: 1094] Allocate a new trap: 0xc0009aff20 11 D0713 05:28:09.036866 700060 usertrap_amd64.go:225] [ 1094: 1094] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:09.041022 700060 usertrap_amd64.go:212] [ 1094: 1095] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.041083 700060 usertrap_amd64.go:122] [ 1094: 1095] Allocate a new trap: 0xc0009aff20 12 D0713 05:28:09.042447 700060 usertrap_amd64.go:225] [ 1094: 1095] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:09.046036 700060 usertrap_amd64.go:212] [ 1094: 1095] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.046143 700060 usertrap_amd64.go:122] [ 1094: 1095] Allocate a new trap: 0xc0009aff20 13 D0713 05:28:09.046218 700060 usertrap_amd64.go:225] [ 1094: 1095] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:09.046281 700060 task_signals.go:470] [ 1094: 1094] Notified of signal 23 D0713 05:28:09.046446 700060 task_signals.go:220] [ 1094: 1094] Signal 23: delivering to handler I0713 05:28:09.048818 700060 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0713 05:28:09.048898 700060 usertrap_amd64.go:212] [ 1094: 1094] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.048907 700060 usertrap_amd64.go:122] [ 1094: 1094] Allocate a new trap: 0xc0009aff20 14 D0713 05:28:09.048916 700060 usertrap_amd64.go:225] [ 1094: 1094] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:09.048931 700060 task_exit.go:204] [ 1094: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.048979 700060 task_exit.go:204] [ 1094: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.049000 700060 task_signals.go:204] [ 1094: 1095] Signal 1094, PID: 1095, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.049011 700060 task_exit.go:204] [ 1094: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.049016 700060 task_exit.go:204] [ 1094: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.049020 700060 task_exit.go:204] [ 1094: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.049052 700060 task_signals.go:204] [ 1094: 1096] Signal 1094, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.049059 700060 task_exit.go:204] [ 1094: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.049063 700060 task_exit.go:204] [ 1094: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.049066 700060 task_exit.go:204] [ 1094: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.049075 700060 task_signals.go:204] [ 1094: 1097] Signal 1094, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.049082 700060 task_exit.go:204] [ 1094: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.049089 700060 task_exit.go:204] [ 1094: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.049094 700060 task_exit.go:204] [ 1094: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.049117 700060 task_signals.go:204] [ 1094: 1098] Signal 1094, PID: 1098, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.049126 700060 task_exit.go:204] [ 1094: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.049978 700060 task_exit.go:204] [ 1094: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.049993 700060 task_exit.go:204] [ 1094: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.050005 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.050068 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.050077 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.050137 700060 task_exit.go:204] [ 1094: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.050664 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.051198 700060 task_signals.go:481] [ 5: 7] No task notified of signal 23 D0713 05:28:09.052603 700060 syscalls.go:262] [ 1099: 1099] Allocating stack with size of 8388608 bytes D0713 05:28:09.052768 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.052868 700060 task_signals.go:220] [ 5: 7] Signal 23: delivering to handler D0713 05:28:09.053210 700060 task_signals.go:470] [ 5: 7] Notified of signal 23 D0713 05:28:09.053250 700060 task_signals.go:220] [ 5: 7] Signal 23: delivering to handler D0713 05:28:09.053869 700060 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.053921 700060 usertrap_amd64.go:106] [ 1099: 1099] Map a usertrap vma at 66000 D0713 05:28:09.054045 700060 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc000960900 1 D0713 05:28:09.054077 700060 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:09.054492 700060 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.054508 700060 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc000960900 2 D0713 05:28:09.054527 700060 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:09.055320 700060 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.055348 700060 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc000960900 3 D0713 05:28:09.055359 700060 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:09.060897 700060 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.060925 700060 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc000960900 4 D0713 05:28:09.060953 700060 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:09.062585 700060 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.062604 700060 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc000960900 5 D0713 05:28:09.062615 700060 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:09.062673 700060 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.062690 700060 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc000960900 6 D0713 05:28:09.062703 700060 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:09.063007 700060 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.063028 700060 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc000960900 7 D0713 05:28:09.063038 700060 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:09.063211 700060 usertrap_amd64.go:212] [ 1099: 1100] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.063232 700060 usertrap_amd64.go:122] [ 1099: 1100] Allocate a new trap: 0xc000960900 8 D0713 05:28:09.063241 700060 usertrap_amd64.go:225] [ 1099: 1100] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:09.063500 700060 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.063528 700060 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc000960900 9 D0713 05:28:09.063539 700060 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:09.063551 700060 usertrap_amd64.go:212] [ 1099: 1100] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.063558 700060 usertrap_amd64.go:122] [ 1099: 1100] Allocate a new trap: 0xc000960900 10 D0713 05:28:09.063565 700060 usertrap_amd64.go:225] [ 1099: 1100] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:09.063602 700060 usertrap_amd64.go:212] [ 1099: 1102] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:09.063629 700060 usertrap_amd64.go:122] [ 1099: 1102] Allocate a new trap: 0xc000960900 11 D0713 05:28:09.063643 700060 usertrap_amd64.go:225] [ 1099: 1102] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:09.070320 700060 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.070347 700060 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc000960900 12 D0713 05:28:09.070356 700060 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:09.073863 700060 usertrap_amd64.go:212] [ 1099: 1100] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.073894 700060 usertrap_amd64.go:122] [ 1099: 1100] Allocate a new trap: 0xc000960900 13 D0713 05:28:09.073908 700060 usertrap_amd64.go:225] [ 1099: 1100] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:09.073965 700060 usertrap_amd64.go:212] [ 1099: 1100] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.073975 700060 usertrap_amd64.go:122] [ 1099: 1100] Allocate a new trap: 0xc000960900 14 D0713 05:28:09.073983 700060 usertrap_amd64.go:225] [ 1099: 1100] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:09.074030 700060 task_signals.go:470] [ 1099: 1099] Notified of signal 23 D0713 05:28:09.074084 700060 task_signals.go:220] [ 1099: 1099] Signal 23: delivering to handler I0713 05:28:09.079512 700060 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0713 05:28:09.079606 700060 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.079619 700060 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc000960900 15 D0713 05:28:09.079629 700060 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 05:28:09.079701 700060 task_exit.go:204] [ 1099: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.079749 700060 task_exit.go:204] [ 1099: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.079767 700060 task_signals.go:204] [ 1099: 1102] Signal 1099, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.079788 700060 task_exit.go:204] [ 1099: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.079792 700060 task_signals.go:204] [ 1099: 1101] Signal 1099, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.079804 700060 task_exit.go:204] [ 1099: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.079827 700060 task_exit.go:204] [ 1099: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.079847 700060 task_signals.go:204] [ 1099: 1103] Signal 1099, PID: 1103, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.079864 700060 task_signals.go:204] [ 1099: 1104] Signal 1099, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.079878 700060 task_exit.go:204] [ 1099: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.079938 700060 task_signals.go:204] [ 1099: 1100] Signal 1099, PID: 1100, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.079957 700060 task_exit.go:204] [ 1099: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.079970 700060 task_exit.go:204] [ 1099: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.079979 700060 task_exit.go:204] [ 1099: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.079984 700060 task_exit.go:204] [ 1099: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.079987 700060 task_exit.go:204] [ 1099: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.079995 700060 task_exit.go:204] [ 1099: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.080000 700060 task_exit.go:204] [ 1099: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.080004 700060 task_exit.go:204] [ 1099: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.080010 700060 task_exit.go:204] [ 1099: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.081069 700060 task_exit.go:204] [ 1099: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.081094 700060 task_exit.go:204] [ 1099: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.081125 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.081159 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.081171 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.081270 700060 task_exit.go:204] [ 1099: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.081953 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.083489 700060 syscalls.go:262] [ 1105: 1105] Allocating stack with size of 8388608 bytes D0713 05:28:09.083622 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.086965 700060 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.087001 700060 usertrap_amd64.go:106] [ 1105: 1105] Map a usertrap vma at 66000 D0713 05:28:09.087069 700060 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0026d8030 1 D0713 05:28:09.087095 700060 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:09.087382 700060 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.087396 700060 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0026d8030 2 D0713 05:28:09.087404 700060 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:09.088049 700060 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.088085 700060 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0026d8030 3 D0713 05:28:09.088100 700060 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:09.100278 700060 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.100316 700060 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0026d8030 4 D0713 05:28:09.100331 700060 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:09.101641 700060 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.101666 700060 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0026d8030 5 D0713 05:28:09.101675 700060 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:09.101724 700060 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.101729 700060 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0026d8030 6 D0713 05:28:09.101734 700060 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:09.102064 700060 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.102085 700060 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0026d8030 7 D0713 05:28:09.102092 700060 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:09.102241 700060 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.102260 700060 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc0026d8030 8 D0713 05:28:09.102268 700060 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:09.102520 700060 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.102542 700060 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc0026d8030 9 D0713 05:28:09.102558 700060 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:09.102624 700060 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.102679 700060 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0026d8030 10 D0713 05:28:09.102696 700060 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:09.110825 700060 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.110853 700060 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0026d8030 11 D0713 05:28:09.110863 700060 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:09.113345 700060 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.113376 700060 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc0026d8030 12 D0713 05:28:09.113388 700060 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:09.113439 700060 usertrap_amd64.go:212] [ 1105: 1106] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.113455 700060 usertrap_amd64.go:122] [ 1105: 1106] Allocate a new trap: 0xc0026d8030 13 D0713 05:28:09.113465 700060 usertrap_amd64.go:225] [ 1105: 1106] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:09.113549 700060 task_signals.go:470] [ 1105: 1105] Notified of signal 23 D0713 05:28:09.113628 700060 task_signals.go:220] [ 1105: 1105] Signal 23: delivering to handler D0713 05:28:09.120826 700060 usertrap_amd64.go:212] [ 1105: 1105] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.120855 700060 usertrap_amd64.go:122] [ 1105: 1105] Allocate a new trap: 0xc0026d8030 14 D0713 05:28:09.120869 700060 usertrap_amd64.go:225] [ 1105: 1105] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:09.120913 700060 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.120987 700060 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.121060 700060 task_signals.go:204] [ 1105: 1108] Signal 1105, PID: 1108, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.121084 700060 task_signals.go:204] [ 1105: 1107] Signal 1105, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.121083 700060 task_signals.go:204] [ 1105: 1106] Signal 1105, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.121097 700060 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.121108 700060 task_signals.go:204] [ 1105: 1109] Signal 1105, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.121126 700060 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.121139 700060 task_exit.go:204] [ 1105: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.121152 700060 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.121158 700060 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.121162 700060 task_exit.go:204] [ 1105: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.121171 700060 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.121176 700060 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.121180 700060 task_exit.go:204] [ 1105: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.121187 700060 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.122118 700060 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.122157 700060 task_exit.go:204] [ 1105: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.122173 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.122198 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.122208 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.122282 700060 task_exit.go:204] [ 1105: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.123151 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.124441 700060 syscalls.go:262] [ 1110: 1110] Allocating stack with size of 8388608 bytes D0713 05:28:09.124532 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.125790 700060 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.125826 700060 usertrap_amd64.go:106] [ 1110: 1110] Map a usertrap vma at 64000 D0713 05:28:09.125907 700060 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc001318780 1 D0713 05:28:09.125933 700060 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:09.126188 700060 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.126206 700060 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc001318780 2 D0713 05:28:09.126213 700060 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:09.126978 700060 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.127005 700060 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc001318780 3 D0713 05:28:09.127016 700060 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:09.133305 700060 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.133336 700060 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc001318780 4 D0713 05:28:09.133348 700060 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:09.134328 700060 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.134358 700060 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc001318780 5 D0713 05:28:09.134366 700060 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:09.134417 700060 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.134423 700060 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc001318780 6 D0713 05:28:09.134432 700060 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:09.134690 700060 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.134713 700060 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc001318780 7 D0713 05:28:09.134722 700060 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:09.134967 700060 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.134989 700060 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc001318780 8 D0713 05:28:09.134996 700060 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:09.135246 700060 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.135281 700060 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc001318780 9 D0713 05:28:09.135293 700060 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:09.135310 700060 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.135317 700060 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc001318780 10 D0713 05:28:09.135326 700060 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:09.141568 700060 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.141594 700060 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc001318780 11 D0713 05:28:09.141605 700060 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:09.145552 700060 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.145739 700060 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc001318780 12 D0713 05:28:09.145774 700060 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:09.145842 700060 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.145851 700060 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc001318780 13 D0713 05:28:09.145860 700060 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:09.145876 700060 task_signals.go:470] [ 1110: 1110] Notified of signal 23 D0713 05:28:09.145928 700060 task_signals.go:220] [ 1110: 1110] Signal 23: delivering to handler D0713 05:28:09.151827 700060 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.151864 700060 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc001318780 14 D0713 05:28:09.151878 700060 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:09.151915 700060 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.151930 700060 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.151944 700060 task_signals.go:204] [ 1110: 1111] Signal 1110, PID: 1111, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.151956 700060 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.151961 700060 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.151964 700060 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.151977 700060 task_signals.go:204] [ 1110: 1114] Signal 1110, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.151982 700060 task_signals.go:204] [ 1110: 1113] Signal 1110, PID: 1113, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.151998 700060 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.152035 700060 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.152049 700060 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.152068 700060 task_signals.go:204] [ 1110: 1112] Signal 1110, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.152080 700060 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.152087 700060 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.152125 700060 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.152138 700060 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.153117 700060 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.153146 700060 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.153159 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.153184 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.153204 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.153374 700060 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.154099 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.155433 700060 syscalls.go:262] [ 1115: 1115] Allocating stack with size of 8388608 bytes D0713 05:28:09.155550 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.159412 700060 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.159480 700060 usertrap_amd64.go:106] [ 1115: 1115] Map a usertrap vma at 66000 D0713 05:28:09.159587 700060 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc00161e0c0 1 D0713 05:28:09.159615 700060 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:09.160061 700060 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.160089 700060 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc00161e0c0 2 D0713 05:28:09.160100 700060 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:09.160694 700060 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.160723 700060 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc00161e0c0 3 D0713 05:28:09.160737 700060 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:09.167118 700060 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.167148 700060 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc00161e0c0 4 D0713 05:28:09.167158 700060 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:09.168260 700060 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.168277 700060 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc00161e0c0 5 D0713 05:28:09.168284 700060 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:09.168298 700060 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.168302 700060 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc00161e0c0 6 D0713 05:28:09.168307 700060 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:09.168588 700060 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.168603 700060 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc00161e0c0 7 D0713 05:28:09.168612 700060 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:09.168742 700060 usertrap_amd64.go:212] [ 1115: 1116] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.168768 700060 usertrap_amd64.go:122] [ 1115: 1116] Allocate a new trap: 0xc00161e0c0 8 D0713 05:28:09.168784 700060 usertrap_amd64.go:225] [ 1115: 1116] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:09.169024 700060 usertrap_amd64.go:212] [ 1115: 1116] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.169048 700060 usertrap_amd64.go:122] [ 1115: 1116] Allocate a new trap: 0xc00161e0c0 9 D0713 05:28:09.169058 700060 usertrap_amd64.go:225] [ 1115: 1116] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:09.169105 700060 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.169127 700060 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc00161e0c0 10 D0713 05:28:09.169171 700060 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:09.169292 700060 usertrap_amd64.go:212] [ 1115: 1118] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:09.169413 700060 usertrap_amd64.go:122] [ 1115: 1118] Allocate a new trap: 0xc00161e0c0 11 D0713 05:28:09.169493 700060 usertrap_amd64.go:225] [ 1115: 1118] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:09.179079 700060 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.179117 700060 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc00161e0c0 12 D0713 05:28:09.179130 700060 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:09.179762 700060 usertrap_amd64.go:212] [ 1115: 1116] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.179788 700060 usertrap_amd64.go:122] [ 1115: 1116] Allocate a new trap: 0xc00161e0c0 13 D0713 05:28:09.179811 700060 usertrap_amd64.go:225] [ 1115: 1116] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:09.181644 700060 usertrap_amd64.go:212] [ 1115: 1116] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.181681 700060 usertrap_amd64.go:122] [ 1115: 1116] Allocate a new trap: 0xc00161e0c0 14 D0713 05:28:09.181695 700060 usertrap_amd64.go:225] [ 1115: 1116] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:09.181761 700060 task_signals.go:470] [ 1115: 1115] Notified of signal 23 D0713 05:28:09.181788 700060 task_signals.go:220] [ 1115: 1115] Signal 23: delivering to handler D0713 05:28:09.189213 700060 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.189249 700060 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc00161e0c0 15 D0713 05:28:09.189263 700060 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 05:28:09.190268 700060 task_exit.go:204] [ 1115: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.190301 700060 task_exit.go:204] [ 1115: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.190326 700060 task_signals.go:204] [ 1115: 1116] Signal 1115, PID: 1116, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.190342 700060 task_exit.go:204] [ 1115: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.190350 700060 task_exit.go:204] [ 1115: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.190356 700060 task_exit.go:204] [ 1115: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.190379 700060 task_signals.go:204] [ 1115: 1117] Signal 1115, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.190390 700060 task_exit.go:204] [ 1115: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.190399 700060 task_exit.go:204] [ 1115: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.190404 700060 task_exit.go:204] [ 1115: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.190419 700060 task_signals.go:204] [ 1115: 1118] Signal 1115, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.190429 700060 task_exit.go:204] [ 1115: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.190437 700060 task_exit.go:204] [ 1115: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.190443 700060 task_exit.go:204] [ 1115: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.190457 700060 task_signals.go:204] [ 1115: 1119] Signal 1115, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.190467 700060 task_exit.go:204] [ 1115: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.190474 700060 task_exit.go:204] [ 1115: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.190480 700060 task_exit.go:204] [ 1115: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.190493 700060 task_signals.go:204] [ 1115: 1120] Signal 1115, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.190503 700060 task_exit.go:204] [ 1115: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.191479 700060 task_exit.go:204] [ 1115: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.191519 700060 task_exit.go:204] [ 1115: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.191533 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.191635 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.191656 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.191959 700060 task_exit.go:204] [ 1115: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.192311 700060 task_signals.go:470] [ 5: 7] Notified of signal 23 D0713 05:28:09.192396 700060 task_signals.go:220] [ 5: 7] Signal 23: delivering to handler D0713 05:28:09.192674 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.194095 700060 syscalls.go:262] [ 1121: 1121] Allocating stack with size of 8388608 bytes D0713 05:28:09.194181 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.195262 700060 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.195294 700060 usertrap_amd64.go:106] [ 1121: 1121] Map a usertrap vma at 60000 D0713 05:28:09.195371 700060 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00161e360 1 D0713 05:28:09.195406 700060 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:09.195654 700060 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.195672 700060 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00161e360 2 D0713 05:28:09.195679 700060 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:09.196083 700060 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.196119 700060 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00161e360 3 D0713 05:28:09.196133 700060 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:09.201464 700060 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.201501 700060 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00161e360 4 D0713 05:28:09.201513 700060 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:09.202704 700060 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.202748 700060 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00161e360 5 D0713 05:28:09.202760 700060 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:09.202807 700060 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.202832 700060 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00161e360 6 D0713 05:28:09.202841 700060 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:09.203233 700060 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.203254 700060 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00161e360 7 D0713 05:28:09.203261 700060 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:09.203401 700060 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.203432 700060 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc00161e360 8 D0713 05:28:09.203444 700060 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:09.203803 700060 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.203828 700060 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00161e360 9 D0713 05:28:09.203853 700060 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:09.203867 700060 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.203884 700060 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc00161e360 10 D0713 05:28:09.203956 700060 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:09.212369 700060 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.212397 700060 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00161e360 11 D0713 05:28:09.212406 700060 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:09.215712 700060 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.215746 700060 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc00161e360 12 D0713 05:28:09.215759 700060 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:09.216646 700060 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.216671 700060 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc00161e360 13 D0713 05:28:09.216683 700060 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:09.216763 700060 task_signals.go:470] [ 1121: 1121] Notified of signal 23 D0713 05:28:09.219869 700060 task_signals.go:220] [ 1121: 1121] Signal 23: delivering to handler D0713 05:28:09.227015 700060 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.227052 700060 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc00161e360 14 D0713 05:28:09.227074 700060 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:09.227130 700060 task_signals.go:470] [ 1121: 1121] Notified of signal 23 D0713 05:28:09.227191 700060 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.227216 700060 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.227239 700060 task_signals.go:204] [ 1121: 1122] Signal 1121, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.227263 700060 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.227268 700060 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.227251 700060 task_signals.go:204] [ 1121: 1124] Signal 1121, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.227272 700060 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.227297 700060 task_signals.go:204] [ 1121: 1125] Signal 1121, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.227310 700060 task_signals.go:204] [ 1121: 1123] Signal 1121, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.227315 700060 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.227330 700060 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.227363 700060 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.227370 700060 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.227383 700060 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.227418 700060 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.227436 700060 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.228296 700060 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.228346 700060 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.228372 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.228408 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.228426 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.228661 700060 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.228871 700060 task_signals.go:470] [ 5: 7] Notified of signal 23 D0713 05:28:09.229064 700060 task_signals.go:220] [ 5: 7] Signal 23: delivering to handler D0713 05:28:09.229516 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.230840 700060 syscalls.go:262] [ 1126: 1126] Allocating stack with size of 8388608 bytes D0713 05:28:09.230947 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.233756 700060 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.233822 700060 usertrap_amd64.go:106] [ 1126: 1126] Map a usertrap vma at 65000 D0713 05:28:09.233948 700060 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000960c90 1 D0713 05:28:09.234038 700060 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:09.234566 700060 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.234593 700060 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000960c90 2 D0713 05:28:09.234606 700060 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:09.235279 700060 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.235312 700060 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000960c90 3 D0713 05:28:09.235323 700060 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:09.241113 700060 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.241143 700060 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000960c90 4 D0713 05:28:09.241159 700060 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:09.242205 700060 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.242238 700060 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000960c90 5 D0713 05:28:09.242248 700060 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:09.242300 700060 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.242313 700060 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000960c90 6 D0713 05:28:09.242319 700060 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:09.242636 700060 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.242662 700060 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000960c90 7 D0713 05:28:09.242671 700060 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:09.242868 700060 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.242895 700060 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000960c90 8 D0713 05:28:09.242906 700060 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:09.243110 700060 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.243134 700060 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000960c90 9 D0713 05:28:09.243144 700060 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:09.243155 700060 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.243161 700060 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000960c90 10 D0713 05:28:09.243169 700060 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:09.243406 700060 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:09.243435 700060 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000960c90 11 D0713 05:28:09.243447 700060 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:09.250740 700060 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.250797 700060 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000960c90 12 D0713 05:28:09.250806 700060 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:09.254683 700060 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.254722 700060 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000960c90 13 D0713 05:28:09.254734 700060 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:09.254752 700060 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.254759 700060 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000960c90 14 D0713 05:28:09.254766 700060 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:09.254789 700060 task_signals.go:470] [ 1126: 1126] Notified of signal 23 D0713 05:28:09.254816 700060 task_signals.go:220] [ 1126: 1126] Signal 23: delivering to handler D0713 05:28:09.260508 700060 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.260540 700060 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000960c90 15 D0713 05:28:09.260549 700060 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 05:28:09.260593 700060 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.260611 700060 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.260626 700060 task_signals.go:204] [ 1126: 1128] Signal 1126, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.260656 700060 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.260667 700060 task_signals.go:204] [ 1126: 1129] Signal 1126, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.260671 700060 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.260678 700060 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.260648 700060 task_signals.go:204] [ 1126: 1127] Signal 1126, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.260706 700060 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.260714 700060 task_signals.go:204] [ 1126: 1130] Signal 1126, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.260727 700060 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.260733 700060 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.260742 700060 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.260751 700060 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.260766 700060 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.260776 700060 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.261727 700060 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.261763 700060 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.261779 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.261801 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.261810 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.261874 700060 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.262449 700060 task_stop.go:118] [ 5: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.263730 700060 syscalls.go:262] [ 1131: 1131] Allocating stack with size of 8388608 bytes D0713 05:28:09.263826 700060 task_stop.go:138] [ 5: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.264755 700060 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.264841 700060 usertrap_amd64.go:106] [ 1131: 1131] Map a usertrap vma at 66000 D0713 05:28:09.264937 700060 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc00161e540 1 D0713 05:28:09.265022 700060 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:09.265234 700060 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.265255 700060 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc00161e540 2 D0713 05:28:09.265265 700060 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:09.265863 700060 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.265888 700060 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc00161e540 3 D0713 05:28:09.265899 700060 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:09.271426 700060 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.271452 700060 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc00161e540 4 D0713 05:28:09.271459 700060 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:09.272264 700060 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.272284 700060 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc00161e540 5 D0713 05:28:09.272291 700060 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:09.272342 700060 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.272360 700060 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc00161e540 6 D0713 05:28:09.272368 700060 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:09.272687 700060 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.272709 700060 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc00161e540 7 D0713 05:28:09.272719 700060 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:09.272866 700060 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.272896 700060 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc00161e540 8 D0713 05:28:09.272907 700060 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:09.273135 700060 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.273155 700060 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc00161e540 9 D0713 05:28:09.273164 700060 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:09.273175 700060 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.273181 700060 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc00161e540 10 D0713 05:28:09.273189 700060 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:09.273565 700060 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.273590 700060 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc00161e540 11 D0713 05:28:09.273599 700060 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:09.273630 700060 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.273638 700060 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc00161e540 12 D0713 05:28:09.273655 700060 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:09.273696 700060 task_signals.go:470] [ 1131: 1131] Notified of signal 23 D0713 05:28:09.273788 700060 task_signals.go:220] [ 1131: 1131] Signal 23: delivering to handler D0713 05:28:09.279387 700060 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.279415 700060 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc00161e540 13 D0713 05:28:09.279426 700060 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:09.284225 700060 task_signals.go:470] [ 1131: 1131] Notified of signal 23 D0713 05:28:09.284926 700060 task_signals.go:220] [ 1131: 1131] Signal 23: delivering to handler D0713 05:28:09.291473 700060 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.291520 700060 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc00161e540 14 D0713 05:28:09.291536 700060 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:09.291579 700060 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.291620 700060 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.291651 700060 task_signals.go:204] [ 1131: 1132] Signal 1131, PID: 1132, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.291669 700060 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.291669 700060 task_signals.go:204] [ 1131: 1134] Signal 1131, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.291681 700060 task_signals.go:204] [ 1131: 1135] Signal 1131, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.291691 700060 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.291698 700060 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.291717 700060 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.291717 700060 task_signals.go:204] [ 1131: 1133] Signal 1131, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.291725 700060 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.291748 700060 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.291760 700060 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.291781 700060 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.291786 700060 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.291795 700060 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.292827 700060 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.292872 700060 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.292897 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.292972 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.292997 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.293108 700060 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.293851 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.295628 700060 syscalls.go:262] [ 1136: 1136] Allocating stack with size of 8388608 bytes D0713 05:28:09.295737 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.296673 700060 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.296715 700060 usertrap_amd64.go:106] [ 1136: 1136] Map a usertrap vma at 61000 D0713 05:28:09.296819 700060 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028325a0 1 D0713 05:28:09.296853 700060 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:09.297328 700060 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.297360 700060 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028325a0 2 D0713 05:28:09.297372 700060 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:09.298192 700060 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.298226 700060 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028325a0 3 D0713 05:28:09.298239 700060 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:09.305696 700060 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.305747 700060 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028325a0 4 D0713 05:28:09.305760 700060 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:09.306794 700060 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.306830 700060 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028325a0 5 D0713 05:28:09.306847 700060 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:09.306909 700060 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.306918 700060 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028325a0 6 D0713 05:28:09.306927 700060 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:09.307461 700060 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.307486 700060 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028325a0 7 D0713 05:28:09.307503 700060 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:09.307653 700060 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.307678 700060 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc0028325a0 8 D0713 05:28:09.307689 700060 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:09.307825 700060 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.307838 700060 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc0028325a0 9 D0713 05:28:09.307847 700060 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:09.307886 700060 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.307900 700060 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028325a0 10 D0713 05:28:09.307907 700060 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:09.315566 700060 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.315599 700060 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028325a0 11 D0713 05:28:09.315612 700060 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:09.319273 700060 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.319317 700060 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc0028325a0 12 D0713 05:28:09.319330 700060 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:09.319375 700060 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.319381 700060 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc0028325a0 13 D0713 05:28:09.319387 700060 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:09.319408 700060 task_signals.go:470] [ 1136: 1136] Notified of signal 23 D0713 05:28:09.319439 700060 task_signals.go:220] [ 1136: 1136] Signal 23: delivering to handler D0713 05:28:09.325893 700060 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.325940 700060 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0028325a0 14 D0713 05:28:09.325956 700060 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:09.326017 700060 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.326039 700060 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.326066 700060 task_signals.go:204] [ 1136: 1137] Signal 1136, PID: 1137, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.326093 700060 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.326102 700060 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.326108 700060 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.326132 700060 task_signals.go:204] [ 1136: 1138] Signal 1136, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.326153 700060 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.326161 700060 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.326166 700060 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.326179 700060 task_signals.go:204] [ 1136: 1139] Signal 1136, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.326197 700060 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.326204 700060 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.326218 700060 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.326233 700060 task_signals.go:204] [ 1136: 1140] Signal 1136, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.326252 700060 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.327369 700060 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.327396 700060 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.327413 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.328195 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.328279 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.328593 700060 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.329347 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.331444 700060 syscalls.go:262] [ 1141: 1141] Allocating stack with size of 8388608 bytes D0713 05:28:09.331559 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.332630 700060 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.332660 700060 usertrap_amd64.go:106] [ 1141: 1141] Map a usertrap vma at 63000 D0713 05:28:09.332739 700060 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000869c20 1 D0713 05:28:09.332776 700060 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:09.333171 700060 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.333199 700060 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000869c20 2 D0713 05:28:09.333209 700060 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:09.334251 700060 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.334273 700060 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000869c20 3 D0713 05:28:09.334284 700060 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:09.342071 700060 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.342109 700060 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000869c20 4 D0713 05:28:09.342122 700060 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:09.343239 700060 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.343267 700060 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000869c20 5 D0713 05:28:09.343280 700060 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:09.343341 700060 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.343347 700060 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000869c20 6 D0713 05:28:09.343353 700060 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:09.343660 700060 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.343678 700060 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000869c20 7 D0713 05:28:09.343684 700060 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:09.344030 700060 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.344051 700060 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc000869c20 8 D0713 05:28:09.344065 700060 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:09.344595 700060 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.344665 700060 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000869c20 9 D0713 05:28:09.344683 700060 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:09.344713 700060 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.344723 700060 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc000869c20 10 D0713 05:28:09.344733 700060 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:09.352163 700060 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.352210 700060 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000869c20 11 D0713 05:28:09.352229 700060 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:09.356092 700060 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.356131 700060 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc000869c20 12 D0713 05:28:09.356146 700060 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:09.356167 700060 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.356174 700060 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc000869c20 13 D0713 05:28:09.356182 700060 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:09.356201 700060 task_signals.go:470] [ 1141: 1141] Notified of signal 23 D0713 05:28:09.356236 700060 task_signals.go:220] [ 1141: 1141] Signal 23: delivering to handler D0713 05:28:09.361751 700060 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.361778 700060 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000869c20 14 D0713 05:28:09.361787 700060 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:09.361854 700060 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.361884 700060 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.361914 700060 task_signals.go:204] [ 1141: 1145] Signal 1141, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.361944 700060 task_signals.go:204] [ 1141: 1144] Signal 1141, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.361929 700060 task_signals.go:204] [ 1141: 1142] Signal 1141, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.361949 700060 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.361961 700060 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.361944 700060 task_signals.go:204] [ 1141: 1143] Signal 1141, PID: 1143, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.361970 700060 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.361999 700060 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.362932 700060 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.362973 700060 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.363015 700060 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.363030 700060 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.363044 700060 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.363049 700060 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.363117 700060 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.363155 700060 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.363177 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.363203 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.363212 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.363429 700060 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.364089 700060 task_stop.go:118] [ 5: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.365623 700060 syscalls.go:262] [ 1146: 1146] Allocating stack with size of 8388608 bytes D0713 05:28:09.365868 700060 task_stop.go:138] [ 5: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.367070 700060 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.367107 700060 usertrap_amd64.go:106] [ 1146: 1146] Map a usertrap vma at 69000 D0713 05:28:09.367192 700060 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc0026d8b10 1 D0713 05:28:09.367212 700060 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:09.368048 700060 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.368090 700060 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc0026d8b10 2 D0713 05:28:09.368105 700060 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:09.368855 700060 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.368888 700060 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc0026d8b10 3 D0713 05:28:09.368908 700060 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:09.380199 700060 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.380238 700060 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc0026d8b10 4 D0713 05:28:09.380284 700060 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:09.381734 700060 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.381822 700060 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc0026d8b10 5 D0713 05:28:09.381838 700060 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:09.381944 700060 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.381964 700060 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc0026d8b10 6 D0713 05:28:09.382003 700060 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:09.382674 700060 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.382705 700060 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc0026d8b10 7 D0713 05:28:09.382715 700060 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:09.382920 700060 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.382941 700060 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc0026d8b10 8 D0713 05:28:09.382950 700060 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:09.388078 700060 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.388123 700060 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc0026d8b10 9 D0713 05:28:09.388139 700060 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:09.388161 700060 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.388168 700060 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc0026d8b10 10 D0713 05:28:09.388264 700060 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:09.396596 700060 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.396671 700060 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc0026d8b10 11 D0713 05:28:09.396685 700060 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:09.399158 700060 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.399191 700060 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc0026d8b10 12 D0713 05:28:09.399204 700060 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:09.399246 700060 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.399274 700060 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc0026d8b10 13 D0713 05:28:09.399286 700060 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:09.399348 700060 task_signals.go:470] [ 1146: 1146] Notified of signal 23 D0713 05:28:09.399451 700060 task_signals.go:220] [ 1146: 1146] Signal 23: delivering to handler I0713 05:28:09.409288 700060 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0713 05:28:09.409423 700060 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.409449 700060 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc0026d8b10 14 D0713 05:28:09.409469 700060 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:09.410207 700060 task_signals.go:470] [ 1146: 1146] Notified of signal 23 D0713 05:28:09.410266 700060 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.410305 700060 task_signals.go:204] [ 1146: 1147] Signal 1146, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.410338 700060 task_signals.go:204] [ 1146: 1149] Signal 1146, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.410382 700060 task_signals.go:204] [ 1146: 1150] Signal 1146, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.410397 700060 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.410420 700060 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.410376 700060 task_signals.go:204] [ 1146: 1148] Signal 1146, PID: 1148, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.410434 700060 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.410479 700060 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.410555 700060 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.410581 700060 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.410600 700060 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.410616 700060 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.410631 700060 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.410638 700060 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.410687 700060 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.413589 700060 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.413634 700060 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.413742 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.413801 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.413826 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.414027 700060 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.414818 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.416489 700060 syscalls.go:262] [ 1151: 1151] Allocating stack with size of 8388608 bytes D0713 05:28:09.416615 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.419340 700060 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.419420 700060 usertrap_amd64.go:106] [ 1151: 1151] Map a usertrap vma at 66000 D0713 05:28:09.419507 700060 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000960060 1 D0713 05:28:09.419545 700060 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:09.420028 700060 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.420054 700060 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000960060 2 D0713 05:28:09.420064 700060 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:09.420985 700060 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.421014 700060 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000960060 3 D0713 05:28:09.421022 700060 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:09.429472 700060 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.429528 700060 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000960060 4 D0713 05:28:09.429549 700060 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:09.430988 700060 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.431018 700060 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000960060 5 D0713 05:28:09.431033 700060 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:09.431166 700060 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.431195 700060 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000960060 6 D0713 05:28:09.431207 700060 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:09.431878 700060 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.431918 700060 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000960060 7 D0713 05:28:09.431927 700060 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:09.432127 700060 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.432144 700060 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc000960060 8 D0713 05:28:09.432156 700060 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:09.432444 700060 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.432478 700060 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000960060 9 D0713 05:28:09.432491 700060 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:09.432507 700060 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.432514 700060 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc000960060 10 D0713 05:28:09.432523 700060 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:09.432615 700060 usertrap_amd64.go:212] [ 1151: 1154] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:09.432642 700060 usertrap_amd64.go:122] [ 1151: 1154] Allocate a new trap: 0xc000960060 11 D0713 05:28:09.432654 700060 usertrap_amd64.go:225] [ 1151: 1154] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:09.439841 700060 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.439865 700060 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000960060 12 D0713 05:28:09.439875 700060 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:09.442752 700060 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.442780 700060 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc000960060 13 D0713 05:28:09.442793 700060 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:09.442858 700060 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.442894 700060 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc000960060 14 D0713 05:28:09.442908 700060 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:09.442980 700060 task_signals.go:470] [ 1151: 1151] Notified of signal 23 D0713 05:28:09.443071 700060 task_signals.go:220] [ 1151: 1151] Signal 23: delivering to handler D0713 05:28:09.450369 700060 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.450405 700060 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000960060 15 D0713 05:28:09.450426 700060 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 05:28:09.450507 700060 task_exit.go:204] [ 1151: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.450529 700060 task_exit.go:204] [ 1151: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.450560 700060 task_signals.go:204] [ 1151: 1154] Signal 1151, PID: 1154, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.450558 700060 task_signals.go:204] [ 1151: 1153] Signal 1151, PID: 1153, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.450578 700060 task_exit.go:204] [ 1151: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.450572 700060 task_signals.go:204] [ 1151: 1155] Signal 1151, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.450589 700060 task_exit.go:204] [ 1151: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.450596 700060 task_exit.go:204] [ 1151: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.450614 700060 task_exit.go:204] [ 1151: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.450636 700060 task_signals.go:204] [ 1151: 1152] Signal 1151, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.450651 700060 task_exit.go:204] [ 1151: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.450657 700060 task_exit.go:204] [ 1151: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.450669 700060 task_exit.go:204] [ 1151: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.450678 700060 task_exit.go:204] [ 1151: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.450694 700060 task_exit.go:204] [ 1151: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.450709 700060 task_exit.go:204] [ 1151: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.451760 700060 task_exit.go:204] [ 1151: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.451788 700060 task_exit.go:204] [ 1151: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.451808 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.451845 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.451869 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.451932 700060 task_exit.go:204] [ 1151: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.452550 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.454169 700060 syscalls.go:262] [ 1156: 1156] Allocating stack with size of 8388608 bytes D0713 05:28:09.454262 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.455271 700060 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.455306 700060 usertrap_amd64.go:106] [ 1156: 1156] Map a usertrap vma at 68000 D0713 05:28:09.455391 700060 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001318300 1 D0713 05:28:09.455419 700060 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:09.455851 700060 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.455872 700060 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001318300 2 D0713 05:28:09.455882 700060 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:09.456858 700060 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.456884 700060 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001318300 3 D0713 05:28:09.456902 700060 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:09.462018 700060 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.462058 700060 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001318300 4 D0713 05:28:09.462070 700060 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:09.463102 700060 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.463126 700060 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001318300 5 D0713 05:28:09.463134 700060 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:09.463185 700060 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.463203 700060 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001318300 6 D0713 05:28:09.463212 700060 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:09.463385 700060 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.463398 700060 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001318300 7 D0713 05:28:09.463406 700060 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:09.463487 700060 usertrap_amd64.go:212] [ 1156: 1157] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.463505 700060 usertrap_amd64.go:122] [ 1156: 1157] Allocate a new trap: 0xc001318300 8 D0713 05:28:09.463514 700060 usertrap_amd64.go:225] [ 1156: 1157] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:09.463688 700060 usertrap_amd64.go:212] [ 1156: 1157] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.463718 700060 usertrap_amd64.go:122] [ 1156: 1157] Allocate a new trap: 0xc001318300 9 D0713 05:28:09.463729 700060 usertrap_amd64.go:225] [ 1156: 1157] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:09.463750 700060 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.463762 700060 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001318300 10 D0713 05:28:09.463799 700060 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:09.463941 700060 usertrap_amd64.go:212] [ 1156: 1157] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.463960 700060 usertrap_amd64.go:122] [ 1156: 1157] Allocate a new trap: 0xc001318300 11 D0713 05:28:09.463969 700060 usertrap_amd64.go:225] [ 1156: 1157] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:09.463993 700060 usertrap_amd64.go:212] [ 1156: 1157] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.464015 700060 usertrap_amd64.go:122] [ 1156: 1157] Allocate a new trap: 0xc001318300 12 D0713 05:28:09.464033 700060 usertrap_amd64.go:225] [ 1156: 1157] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:09.464057 700060 task_signals.go:470] [ 1156: 1159] Notified of signal 23 D0713 05:28:09.464073 700060 task_signals.go:220] [ 1156: 1159] Signal 23: delivering to handler D0713 05:28:09.469957 700060 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.469987 700060 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001318300 13 D0713 05:28:09.470001 700060 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:09.474744 700060 task_signals.go:470] [ 1156: 1156] Notified of signal 23 D0713 05:28:09.475645 700060 task_signals.go:220] [ 1156: 1156] Signal 23: delivering to handler D0713 05:28:09.479009 700060 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.479037 700060 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001318300 14 D0713 05:28:09.479050 700060 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:09.479111 700060 task_exit.go:204] [ 1156: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.479138 700060 task_exit.go:204] [ 1156: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.479163 700060 task_signals.go:204] [ 1156: 1157] Signal 1156, PID: 1157, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.479191 700060 task_exit.go:204] [ 1156: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.479201 700060 task_exit.go:204] [ 1156: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.479206 700060 task_exit.go:204] [ 1156: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.479224 700060 task_signals.go:204] [ 1156: 1158] Signal 1156, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.479238 700060 task_exit.go:204] [ 1156: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.479244 700060 task_exit.go:204] [ 1156: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.479249 700060 task_exit.go:204] [ 1156: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.479260 700060 task_signals.go:204] [ 1156: 1159] Signal 1156, PID: 1159, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.479278 700060 task_exit.go:204] [ 1156: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.479287 700060 task_exit.go:204] [ 1156: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.479293 700060 task_exit.go:204] [ 1156: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.479308 700060 task_signals.go:204] [ 1156: 1160] Signal 1156, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.479330 700060 task_exit.go:204] [ 1156: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.480153 700060 task_exit.go:204] [ 1156: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.480198 700060 task_exit.go:204] [ 1156: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.480226 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.480251 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.480312 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.480422 700060 task_exit.go:204] [ 1156: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.481062 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.482446 700060 syscalls.go:262] [ 1161: 1161] Allocating stack with size of 8388608 bytes D0713 05:28:09.482539 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.483480 700060 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.483520 700060 usertrap_amd64.go:106] [ 1161: 1161] Map a usertrap vma at 64000 D0713 05:28:09.483583 700060 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000868630 1 D0713 05:28:09.483617 700060 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:09.484012 700060 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.484037 700060 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000868630 2 D0713 05:28:09.484047 700060 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:09.484675 700060 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.484696 700060 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000868630 3 D0713 05:28:09.484703 700060 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:09.490171 700060 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.490205 700060 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000868630 4 D0713 05:28:09.490216 700060 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:09.491285 700060 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.491319 700060 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000868630 5 D0713 05:28:09.491332 700060 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:09.491386 700060 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.491394 700060 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000868630 6 D0713 05:28:09.491403 700060 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:09.491575 700060 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.491593 700060 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000868630 7 D0713 05:28:09.491601 700060 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:09.491727 700060 usertrap_amd64.go:212] [ 1161: 1162] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.491762 700060 usertrap_amd64.go:122] [ 1161: 1162] Allocate a new trap: 0xc000868630 8 D0713 05:28:09.491771 700060 usertrap_amd64.go:225] [ 1161: 1162] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:09.491888 700060 usertrap_amd64.go:212] [ 1161: 1162] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:09.491977 700060 usertrap_amd64.go:122] [ 1161: 1162] Allocate a new trap: 0xc000868630 9 D0713 05:28:09.492074 700060 usertrap_amd64.go:225] [ 1161: 1162] Apply the binary patch addr 46b6e0 trap addr 642d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:09.492133 700060 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.492141 700060 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000868630 10 D0713 05:28:09.492147 700060 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:09.492295 700060 usertrap_amd64.go:212] [ 1161: 1162] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.492333 700060 usertrap_amd64.go:122] [ 1161: 1162] Allocate a new trap: 0xc000868630 11 D0713 05:28:09.492362 700060 usertrap_amd64.go:225] [ 1161: 1162] Apply the binary patch addr 46af76 trap addr 64370 ([184 35 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:09.498942 700060 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.498967 700060 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000868630 12 D0713 05:28:09.498976 700060 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:09.502551 700060 usertrap_amd64.go:212] [ 1161: 1162] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.502570 700060 usertrap_amd64.go:122] [ 1161: 1162] Allocate a new trap: 0xc000868630 13 D0713 05:28:09.502584 700060 usertrap_amd64.go:225] [ 1161: 1162] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:09.502648 700060 usertrap_amd64.go:212] [ 1161: 1162] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.502669 700060 usertrap_amd64.go:122] [ 1161: 1162] Allocate a new trap: 0xc000868630 14 D0713 05:28:09.502678 700060 usertrap_amd64.go:225] [ 1161: 1162] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:09.503387 700060 task_signals.go:470] [ 1161: 1161] Notified of signal 23 D0713 05:28:09.503480 700060 task_signals.go:220] [ 1161: 1161] Signal 23: delivering to handler D0713 05:28:09.508651 700060 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.508681 700060 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000868630 15 D0713 05:28:09.508699 700060 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 05:28:09.508746 700060 task_exit.go:204] [ 1161: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.508768 700060 task_exit.go:204] [ 1161: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.508808 700060 task_signals.go:204] [ 1161: 1165] Signal 1161, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.508837 700060 task_exit.go:204] [ 1161: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.508833 700060 task_signals.go:204] [ 1161: 1163] Signal 1161, PID: 1163, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.508850 700060 task_exit.go:204] [ 1161: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.508805 700060 task_signals.go:204] [ 1161: 1164] Signal 1161, PID: 1164, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.508859 700060 task_exit.go:204] [ 1161: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.508834 700060 task_signals.go:204] [ 1161: 1162] Signal 1161, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.508854 700060 task_signals.go:204] [ 1161: 1166] Signal 1161, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.508875 700060 task_exit.go:204] [ 1161: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.508903 700060 task_exit.go:204] [ 1161: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.508916 700060 task_exit.go:204] [ 1161: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.508932 700060 task_exit.go:204] [ 1161: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.508967 700060 task_exit.go:204] [ 1161: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.508974 700060 task_exit.go:204] [ 1161: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.508994 700060 task_exit.go:204] [ 1161: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.509002 700060 task_exit.go:204] [ 1161: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.509014 700060 task_exit.go:204] [ 1161: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.509022 700060 task_exit.go:204] [ 1161: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.510022 700060 task_exit.go:204] [ 1161: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.510047 700060 task_exit.go:204] [ 1161: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.510061 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.510129 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.510158 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.510276 700060 task_exit.go:204] [ 1161: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.510844 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.512407 700060 syscalls.go:262] [ 1167: 1167] Allocating stack with size of 8388608 bytes D0713 05:28:09.512515 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.513785 700060 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.513816 700060 usertrap_amd64.go:106] [ 1167: 1167] Map a usertrap vma at 68000 D0713 05:28:09.513913 700060 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000960300 1 D0713 05:28:09.513968 700060 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:09.514259 700060 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.514275 700060 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000960300 2 D0713 05:28:09.514283 700060 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:09.515047 700060 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.515073 700060 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000960300 3 D0713 05:28:09.515082 700060 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:09.520625 700060 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.520656 700060 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000960300 4 D0713 05:28:09.520666 700060 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:09.521644 700060 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.521674 700060 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000960300 5 D0713 05:28:09.521684 700060 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:09.521731 700060 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.521746 700060 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000960300 6 D0713 05:28:09.521751 700060 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:09.522020 700060 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.522037 700060 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000960300 7 D0713 05:28:09.522044 700060 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:09.522120 700060 usertrap_amd64.go:212] [ 1167: 1168] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.522126 700060 usertrap_amd64.go:122] [ 1167: 1168] Allocate a new trap: 0xc000960300 8 D0713 05:28:09.522132 700060 usertrap_amd64.go:225] [ 1167: 1168] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:09.522315 700060 usertrap_amd64.go:212] [ 1167: 1168] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.522337 700060 usertrap_amd64.go:122] [ 1167: 1168] Allocate a new trap: 0xc000960300 9 D0713 05:28:09.522346 700060 usertrap_amd64.go:225] [ 1167: 1168] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:09.522357 700060 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.522362 700060 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000960300 10 D0713 05:28:09.522371 700060 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:09.529565 700060 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.529637 700060 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000960300 11 D0713 05:28:09.529671 700060 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:09.533551 700060 usertrap_amd64.go:212] [ 1167: 1168] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.533588 700060 usertrap_amd64.go:122] [ 1167: 1168] Allocate a new trap: 0xc000960300 12 D0713 05:28:09.533602 700060 usertrap_amd64.go:225] [ 1167: 1168] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:09.533625 700060 usertrap_amd64.go:212] [ 1167: 1168] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.533632 700060 usertrap_amd64.go:122] [ 1167: 1168] Allocate a new trap: 0xc000960300 13 D0713 05:28:09.533644 700060 usertrap_amd64.go:225] [ 1167: 1168] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:09.533693 700060 task_signals.go:470] [ 1167: 1167] Notified of signal 23 D0713 05:28:09.533725 700060 task_signals.go:179] [ 1167: 1167] Restarting syscall 202: interrupted by signal 23 D0713 05:28:09.533736 700060 task_signals.go:220] [ 1167: 1167] Signal 23: delivering to handler D0713 05:28:09.540544 700060 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.540578 700060 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000960300 14 D0713 05:28:09.540589 700060 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:09.540652 700060 task_exit.go:204] [ 1167: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.540684 700060 task_exit.go:204] [ 1167: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.540703 700060 task_signals.go:204] [ 1167: 1169] Signal 1167, PID: 1169, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.540732 700060 task_signals.go:204] [ 1167: 1172] Signal 1167, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.540722 700060 task_signals.go:204] [ 1167: 1171] Signal 1167, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.540740 700060 task_exit.go:204] [ 1167: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.540714 700060 task_signals.go:204] [ 1167: 1170] Signal 1167, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.540755 700060 task_exit.go:204] [ 1167: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.540776 700060 task_signals.go:204] [ 1167: 1168] Signal 1167, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.540800 700060 task_exit.go:204] [ 1167: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.540894 700060 task_exit.go:204] [ 1167: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.541011 700060 task_exit.go:204] [ 1167: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.541073 700060 task_exit.go:204] [ 1167: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.541091 700060 task_exit.go:204] [ 1167: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.541107 700060 task_exit.go:204] [ 1167: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.541113 700060 task_exit.go:204] [ 1167: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.541125 700060 task_exit.go:204] [ 1167: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.541133 700060 task_exit.go:204] [ 1167: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.541139 700060 task_exit.go:204] [ 1167: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.541148 700060 task_exit.go:204] [ 1167: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.542076 700060 task_exit.go:204] [ 1167: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.542101 700060 task_exit.go:204] [ 1167: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.542122 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.542148 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.542157 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.542261 700060 task_exit.go:204] [ 1167: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.542913 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.544826 700060 syscalls.go:262] [ 1173: 1173] Allocating stack with size of 8388608 bytes D0713 05:28:09.545086 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.546800 700060 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.546859 700060 usertrap_amd64.go:106] [ 1173: 1173] Map a usertrap vma at 69000 D0713 05:28:09.546999 700060 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc0013187b0 1 D0713 05:28:09.547035 700060 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:09.547555 700060 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.547617 700060 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc0013187b0 2 D0713 05:28:09.547639 700060 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:09.548686 700060 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.548772 700060 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc0013187b0 3 D0713 05:28:09.548794 700060 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:09.557637 700060 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.557698 700060 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc0013187b0 4 D0713 05:28:09.557723 700060 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:09.559315 700060 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.559353 700060 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc0013187b0 5 D0713 05:28:09.559372 700060 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:09.559429 700060 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.559437 700060 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc0013187b0 6 D0713 05:28:09.559446 700060 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:09.559703 700060 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.559722 700060 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc0013187b0 7 D0713 05:28:09.559735 700060 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:09.559972 700060 usertrap_amd64.go:212] [ 1173: 1174] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.559999 700060 usertrap_amd64.go:122] [ 1173: 1174] Allocate a new trap: 0xc0013187b0 8 D0713 05:28:09.560010 700060 usertrap_amd64.go:225] [ 1173: 1174] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:09.560201 700060 usertrap_amd64.go:212] [ 1173: 1174] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.560221 700060 usertrap_amd64.go:122] [ 1173: 1174] Allocate a new trap: 0xc0013187b0 9 D0713 05:28:09.560230 700060 usertrap_amd64.go:225] [ 1173: 1174] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:09.560580 700060 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.560611 700060 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc0013187b0 10 D0713 05:28:09.560626 700060 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:09.573312 700060 usertrap_amd64.go:212] [ 1173: 1174] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.573413 700060 usertrap_amd64.go:122] [ 1173: 1174] Allocate a new trap: 0xc0013187b0 11 D0713 05:28:09.573440 700060 usertrap_amd64.go:225] [ 1173: 1174] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:09.573496 700060 usertrap_amd64.go:212] [ 1173: 1174] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.573504 700060 usertrap_amd64.go:122] [ 1173: 1174] Allocate a new trap: 0xc0013187b0 12 D0713 05:28:09.573512 700060 usertrap_amd64.go:225] [ 1173: 1174] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:09.573854 700060 task_signals.go:470] [ 1173: 1173] Notified of signal 23 D0713 05:28:09.573947 700060 task_signals.go:220] [ 1173: 1173] Signal 23: delivering to handler D0713 05:28:09.574300 700060 task_signals.go:470] [ 1173: 1173] Notified of signal 23 D0713 05:28:09.574386 700060 task_signals.go:220] [ 1173: 1173] Signal 23: delivering to handler D0713 05:28:09.574535 700060 task_signals.go:470] [ 1173: 1173] Notified of signal 23 D0713 05:28:09.574616 700060 task_signals.go:220] [ 1173: 1173] Signal 23: delivering to handler D0713 05:28:09.576555 700060 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.576602 700060 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc0013187b0 13 D0713 05:28:09.576623 700060 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:09.587117 700060 task_signals.go:470] [ 1173: 1173] Notified of signal 23 D0713 05:28:09.587237 700060 task_signals.go:220] [ 1173: 1173] Signal 23: delivering to handler D0713 05:28:09.591064 700060 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.591085 700060 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc0013187b0 14 D0713 05:28:09.591102 700060 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:09.591177 700060 task_exit.go:204] [ 1173: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.591222 700060 task_signals.go:204] [ 1173: 1174] Signal 1173, PID: 1174, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.591252 700060 task_exit.go:204] [ 1173: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.591276 700060 task_signals.go:204] [ 1173: 1175] Signal 1173, PID: 1175, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.591293 700060 task_signals.go:204] [ 1173: 1177] Signal 1173, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.591305 700060 task_exit.go:204] [ 1173: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.591326 700060 task_signals.go:204] [ 1173: 1176] Signal 1173, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.591344 700060 task_exit.go:204] [ 1173: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.591353 700060 task_exit.go:204] [ 1173: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.591370 700060 task_exit.go:204] [ 1173: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.591390 700060 task_exit.go:204] [ 1173: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.591396 700060 task_exit.go:204] [ 1173: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.591438 700060 task_exit.go:204] [ 1173: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.591521 700060 task_exit.go:204] [ 1173: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.591531 700060 task_exit.go:204] [ 1173: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.591557 700060 task_exit.go:204] [ 1173: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.592786 700060 task_exit.go:204] [ 1173: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.592830 700060 task_exit.go:204] [ 1173: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.592845 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.592875 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.592884 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.593074 700060 task_exit.go:204] [ 1173: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.593860 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.595325 700060 syscalls.go:262] [ 1178: 1178] Allocating stack with size of 8388608 bytes D0713 05:28:09.595451 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.597837 700060 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.597876 700060 usertrap_amd64.go:106] [ 1178: 1178] Map a usertrap vma at 62000 D0713 05:28:09.597997 700060 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc00161e450 1 D0713 05:28:09.598045 700060 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:09.598515 700060 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.598542 700060 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc00161e450 2 D0713 05:28:09.598555 700060 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:09.599347 700060 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.599466 700060 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc00161e450 3 D0713 05:28:09.599488 700060 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:09.606562 700060 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.606596 700060 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc00161e450 4 D0713 05:28:09.606610 700060 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:09.607700 700060 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.607734 700060 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc00161e450 5 D0713 05:28:09.607750 700060 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:09.607824 700060 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.607834 700060 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc00161e450 6 D0713 05:28:09.607842 700060 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:09.608477 700060 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.608519 700060 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc00161e450 7 D0713 05:28:09.608534 700060 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:09.609069 700060 usertrap_amd64.go:212] [ 1178: 1179] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.609107 700060 usertrap_amd64.go:122] [ 1178: 1179] Allocate a new trap: 0xc00161e450 8 D0713 05:28:09.609121 700060 usertrap_amd64.go:225] [ 1178: 1179] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:09.609281 700060 usertrap_amd64.go:212] [ 1178: 1179] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.609335 700060 usertrap_amd64.go:122] [ 1178: 1179] Allocate a new trap: 0xc00161e450 9 D0713 05:28:09.609350 700060 usertrap_amd64.go:225] [ 1178: 1179] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:09.609442 700060 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.609461 700060 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc00161e450 10 D0713 05:28:09.609477 700060 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:09.610005 700060 usertrap_amd64.go:212] [ 1178: 1179] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.610069 700060 usertrap_amd64.go:122] [ 1178: 1179] Allocate a new trap: 0xc00161e450 11 D0713 05:28:09.610090 700060 usertrap_amd64.go:225] [ 1178: 1179] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:09.610217 700060 usertrap_amd64.go:212] [ 1178: 1179] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.610250 700060 usertrap_amd64.go:122] [ 1178: 1179] Allocate a new trap: 0xc00161e450 12 D0713 05:28:09.610264 700060 usertrap_amd64.go:225] [ 1178: 1179] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:09.610303 700060 task_signals.go:470] [ 1178: 1178] Notified of signal 23 D0713 05:28:09.610376 700060 task_signals.go:220] [ 1178: 1178] Signal 23: delivering to handler D0713 05:28:09.616843 700060 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.616880 700060 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc00161e450 13 D0713 05:28:09.616894 700060 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:09.620503 700060 task_signals.go:470] [ 1178: 1178] Notified of signal 23 D0713 05:28:09.620633 700060 task_signals.go:220] [ 1178: 1178] Signal 23: delivering to handler D0713 05:28:09.629417 700060 sys_signal.go:495] [ 1178: 1178] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0713 05:28:09.629614 700060 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.629665 700060 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc00161e450 14 D0713 05:28:09.629685 700060 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:09.629768 700060 task_exit.go:204] [ 1178: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.629805 700060 task_exit.go:204] [ 1178: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.629854 700060 task_signals.go:204] [ 1178: 1179] Signal 1178, PID: 1179, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.629886 700060 task_exit.go:204] [ 1178: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.629896 700060 task_exit.go:204] [ 1178: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.629902 700060 task_exit.go:204] [ 1178: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.629924 700060 task_signals.go:204] [ 1178: 1182] Signal 1178, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.629947 700060 task_exit.go:204] [ 1178: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.629953 700060 task_signals.go:204] [ 1178: 1180] Signal 1178, PID: 1180, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.629974 700060 task_exit.go:204] [ 1178: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.629984 700060 task_exit.go:204] [ 1178: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.629957 700060 task_signals.go:204] [ 1178: 1181] Signal 1178, PID: 1181, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.629999 700060 task_exit.go:204] [ 1178: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.630007 700060 task_exit.go:204] [ 1178: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.630013 700060 task_exit.go:204] [ 1178: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.630024 700060 task_exit.go:204] [ 1178: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.631092 700060 task_exit.go:204] [ 1178: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.631125 700060 task_exit.go:204] [ 1178: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.631140 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.631173 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.631183 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.631335 700060 task_exit.go:204] [ 1178: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.631481 700060 task_signals.go:470] [ 5: 14] Notified of signal 23 D0713 05:28:09.631567 700060 task_signals.go:220] [ 5: 14] Signal 23: delivering to handler D0713 05:28:09.632114 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.633721 700060 syscalls.go:262] [ 1183: 1183] Allocating stack with size of 8388608 bytes D0713 05:28:09.633836 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.639475 700060 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.639529 700060 usertrap_amd64.go:106] [ 1183: 1183] Map a usertrap vma at 63000 D0713 05:28:09.639608 700060 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0026d84b0 1 D0713 05:28:09.639640 700060 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:09.640050 700060 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.640064 700060 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0026d84b0 2 D0713 05:28:09.640077 700060 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:09.641126 700060 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.641156 700060 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0026d84b0 3 D0713 05:28:09.641170 700060 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:09.650441 700060 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.650476 700060 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0026d84b0 4 D0713 05:28:09.650491 700060 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:09.651633 700060 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.651661 700060 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0026d84b0 5 D0713 05:28:09.651674 700060 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:09.651799 700060 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.651812 700060 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0026d84b0 6 D0713 05:28:09.651820 700060 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:09.652213 700060 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.652242 700060 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0026d84b0 7 D0713 05:28:09.652252 700060 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:09.652441 700060 usertrap_amd64.go:212] [ 1183: 1184] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.652467 700060 usertrap_amd64.go:122] [ 1183: 1184] Allocate a new trap: 0xc0026d84b0 8 D0713 05:28:09.652476 700060 usertrap_amd64.go:225] [ 1183: 1184] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:09.652617 700060 usertrap_amd64.go:212] [ 1183: 1184] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.652638 700060 usertrap_amd64.go:122] [ 1183: 1184] Allocate a new trap: 0xc0026d84b0 9 D0713 05:28:09.652648 700060 usertrap_amd64.go:225] [ 1183: 1184] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:09.652708 700060 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.652742 700060 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0026d84b0 10 D0713 05:28:09.652756 700060 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:09.659565 700060 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.659583 700060 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0026d84b0 11 D0713 05:28:09.659596 700060 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:09.662923 700060 usertrap_amd64.go:212] [ 1183: 1184] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.662955 700060 usertrap_amd64.go:122] [ 1183: 1184] Allocate a new trap: 0xc0026d84b0 12 D0713 05:28:09.662969 700060 usertrap_amd64.go:225] [ 1183: 1184] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:09.663035 700060 usertrap_amd64.go:212] [ 1183: 1184] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.663045 700060 usertrap_amd64.go:122] [ 1183: 1184] Allocate a new trap: 0xc0026d84b0 13 D0713 05:28:09.663054 700060 usertrap_amd64.go:225] [ 1183: 1184] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:09.663086 700060 task_signals.go:470] [ 1183: 1183] Notified of signal 23 D0713 05:28:09.663162 700060 task_signals.go:220] [ 1183: 1183] Signal 23: delivering to handler D0713 05:28:09.668884 700060 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.668922 700060 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0026d84b0 14 D0713 05:28:09.668934 700060 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:09.669028 700060 task_exit.go:204] [ 1183: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.669050 700060 task_exit.go:204] [ 1183: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.669064 700060 task_signals.go:204] [ 1183: 1184] Signal 1183, PID: 1184, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.669067 700060 task_signals.go:204] [ 1183: 1185] Signal 1183, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.669083 700060 task_signals.go:204] [ 1183: 1187] Signal 1183, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.669091 700060 task_exit.go:204] [ 1183: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.669115 700060 task_signals.go:204] [ 1183: 1186] Signal 1183, PID: 1186, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.669136 700060 task_exit.go:204] [ 1183: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.669145 700060 task_exit.go:204] [ 1183: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.669157 700060 task_exit.go:204] [ 1183: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.669166 700060 task_exit.go:204] [ 1183: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.669187 700060 task_exit.go:204] [ 1183: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.669199 700060 task_exit.go:204] [ 1183: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.669208 700060 task_exit.go:204] [ 1183: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.669225 700060 task_exit.go:204] [ 1183: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.669235 700060 task_exit.go:204] [ 1183: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.670196 700060 task_exit.go:204] [ 1183: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.670218 700060 task_exit.go:204] [ 1183: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.670237 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.670257 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.670263 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.670492 700060 task_exit.go:204] [ 1183: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.671298 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.672571 700060 syscalls.go:262] [ 1188: 1188] Allocating stack with size of 8388608 bytes D0713 05:28:09.672651 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.673794 700060 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.673842 700060 usertrap_amd64.go:106] [ 1188: 1188] Map a usertrap vma at 68000 D0713 05:28:09.673922 700060 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc00161e7e0 1 D0713 05:28:09.673961 700060 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:09.674896 700060 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.674925 700060 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc00161e7e0 2 D0713 05:28:09.674938 700060 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:09.675598 700060 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.675625 700060 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc00161e7e0 3 D0713 05:28:09.675639 700060 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:09.680512 700060 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.680537 700060 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc00161e7e0 4 D0713 05:28:09.680545 700060 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:09.681402 700060 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.681424 700060 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc00161e7e0 5 D0713 05:28:09.681430 700060 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:09.681480 700060 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.681485 700060 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc00161e7e0 6 D0713 05:28:09.681490 700060 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:09.681745 700060 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.681770 700060 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc00161e7e0 7 D0713 05:28:09.681782 700060 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:09.681915 700060 usertrap_amd64.go:212] [ 1188: 1189] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.681936 700060 usertrap_amd64.go:122] [ 1188: 1189] Allocate a new trap: 0xc00161e7e0 8 D0713 05:28:09.681947 700060 usertrap_amd64.go:225] [ 1188: 1189] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:09.682086 700060 usertrap_amd64.go:212] [ 1188: 1189] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.682157 700060 usertrap_amd64.go:122] [ 1188: 1189] Allocate a new trap: 0xc00161e7e0 9 D0713 05:28:09.682181 700060 usertrap_amd64.go:225] [ 1188: 1189] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:09.682219 700060 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.682232 700060 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc00161e7e0 10 D0713 05:28:09.682241 700060 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:09.688795 700060 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.688824 700060 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc00161e7e0 11 D0713 05:28:09.688835 700060 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:09.692719 700060 usertrap_amd64.go:212] [ 1188: 1189] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.692753 700060 usertrap_amd64.go:122] [ 1188: 1189] Allocate a new trap: 0xc00161e7e0 12 D0713 05:28:09.692769 700060 usertrap_amd64.go:225] [ 1188: 1189] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:09.694250 700060 usertrap_amd64.go:212] [ 1188: 1189] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.694292 700060 usertrap_amd64.go:122] [ 1188: 1189] Allocate a new trap: 0xc00161e7e0 13 D0713 05:28:09.694308 700060 usertrap_amd64.go:225] [ 1188: 1189] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:09.694352 700060 task_signals.go:470] [ 1188: 1188] Notified of signal 23 D0713 05:28:09.694410 700060 task_signals.go:220] [ 1188: 1188] Signal 23: delivering to handler D0713 05:28:09.698114 700060 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.698151 700060 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc00161e7e0 14 D0713 05:28:09.698164 700060 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:09.698225 700060 task_exit.go:204] [ 1188: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.698247 700060 task_exit.go:204] [ 1188: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.698266 700060 task_signals.go:204] [ 1188: 1191] Signal 1188, PID: 1191, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.698277 700060 task_exit.go:204] [ 1188: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.698282 700060 task_exit.go:204] [ 1188: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.698286 700060 task_exit.go:204] [ 1188: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.698274 700060 task_signals.go:204] [ 1188: 1190] Signal 1188, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.698299 700060 task_signals.go:204] [ 1188: 1189] Signal 1188, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.698305 700060 task_signals.go:204] [ 1188: 1192] Signal 1188, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.698317 700060 task_exit.go:204] [ 1188: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.698326 700060 task_exit.go:204] [ 1188: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.698330 700060 task_exit.go:204] [ 1188: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.698336 700060 task_exit.go:204] [ 1188: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.698417 700060 task_exit.go:204] [ 1188: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.698435 700060 task_exit.go:204] [ 1188: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.698450 700060 task_exit.go:204] [ 1188: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.699438 700060 task_exit.go:204] [ 1188: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.699475 700060 task_exit.go:204] [ 1188: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.699488 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.699521 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.699534 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.699716 700060 task_exit.go:204] [ 1188: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.700355 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.701629 700060 syscalls.go:262] [ 1193: 1193] Allocating stack with size of 8388608 bytes D0713 05:28:09.701726 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.702708 700060 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.702747 700060 usertrap_amd64.go:106] [ 1193: 1193] Map a usertrap vma at 6a000 D0713 05:28:09.702843 700060 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc0028323f0 1 D0713 05:28:09.702862 700060 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:09.703093 700060 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.703120 700060 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc0028323f0 2 D0713 05:28:09.703130 700060 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:09.705289 700060 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.705316 700060 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc0028323f0 3 D0713 05:28:09.705331 700060 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:09.711156 700060 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.711188 700060 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc0028323f0 4 D0713 05:28:09.711201 700060 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:09.712291 700060 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.712319 700060 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc0028323f0 5 D0713 05:28:09.712330 700060 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:09.712370 700060 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.712377 700060 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc0028323f0 6 D0713 05:28:09.712385 700060 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:09.712703 700060 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.712736 700060 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc0028323f0 7 D0713 05:28:09.712749 700060 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:09.713004 700060 usertrap_amd64.go:212] [ 1193: 1194] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.713030 700060 usertrap_amd64.go:122] [ 1193: 1194] Allocate a new trap: 0xc0028323f0 8 D0713 05:28:09.713040 700060 usertrap_amd64.go:225] [ 1193: 1194] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:09.713198 700060 usertrap_amd64.go:212] [ 1193: 1194] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.713222 700060 usertrap_amd64.go:122] [ 1193: 1194] Allocate a new trap: 0xc0028323f0 9 D0713 05:28:09.713233 700060 usertrap_amd64.go:225] [ 1193: 1194] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:09.713562 700060 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.713643 700060 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc0028323f0 10 D0713 05:28:09.713703 700060 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:09.720220 700060 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.720251 700060 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc0028323f0 11 D0713 05:28:09.720265 700060 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:09.724352 700060 usertrap_amd64.go:212] [ 1193: 1194] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.724387 700060 usertrap_amd64.go:122] [ 1193: 1194] Allocate a new trap: 0xc0028323f0 12 D0713 05:28:09.724406 700060 usertrap_amd64.go:225] [ 1193: 1194] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:09.724422 700060 usertrap_amd64.go:212] [ 1193: 1194] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.724429 700060 usertrap_amd64.go:122] [ 1193: 1194] Allocate a new trap: 0xc0028323f0 13 D0713 05:28:09.724436 700060 usertrap_amd64.go:225] [ 1193: 1194] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:09.724449 700060 task_signals.go:470] [ 1193: 1193] Notified of signal 23 D0713 05:28:09.724496 700060 task_signals.go:220] [ 1193: 1193] Signal 23: delivering to handler D0713 05:28:09.729702 700060 usertrap_amd64.go:212] [ 1193: 1193] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.729737 700060 usertrap_amd64.go:122] [ 1193: 1193] Allocate a new trap: 0xc0028323f0 14 D0713 05:28:09.729750 700060 usertrap_amd64.go:225] [ 1193: 1193] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:09.729786 700060 task_exit.go:204] [ 1193: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.729807 700060 task_exit.go:204] [ 1193: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.729840 700060 task_signals.go:204] [ 1193: 1194] Signal 1193, PID: 1194, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.729857 700060 task_exit.go:204] [ 1193: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.729865 700060 task_exit.go:204] [ 1193: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.729871 700060 task_exit.go:204] [ 1193: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.729886 700060 task_signals.go:204] [ 1193: 1195] Signal 1193, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.729920 700060 task_exit.go:204] [ 1193: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.729928 700060 task_exit.go:204] [ 1193: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.729933 700060 task_exit.go:204] [ 1193: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.729948 700060 task_signals.go:204] [ 1193: 1196] Signal 1193, PID: 1196, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.729959 700060 task_exit.go:204] [ 1193: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.729970 700060 task_exit.go:204] [ 1193: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.729975 700060 task_exit.go:204] [ 1193: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.729990 700060 task_signals.go:204] [ 1193: 1197] Signal 1193, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.730001 700060 task_exit.go:204] [ 1193: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.730007 700060 task_exit.go:204] [ 1193: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.730012 700060 task_exit.go:204] [ 1193: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.730024 700060 task_signals.go:204] [ 1193: 1198] Signal 1193, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.730049 700060 task_exit.go:204] [ 1193: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.730994 700060 task_exit.go:204] [ 1193: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.731023 700060 task_exit.go:204] [ 1193: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.731042 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.731116 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.731211 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.731349 700060 task_exit.go:204] [ 1193: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.732061 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.733609 700060 syscalls.go:262] [ 1199: 1199] Allocating stack with size of 8388608 bytes D0713 05:28:09.733718 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.735510 700060 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.735559 700060 usertrap_amd64.go:106] [ 1199: 1199] Map a usertrap vma at 62000 D0713 05:28:09.735707 700060 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000960b40 1 D0713 05:28:09.735740 700060 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:09.736204 700060 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.736230 700060 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000960b40 2 D0713 05:28:09.736241 700060 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:09.736907 700060 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.736935 700060 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000960b40 3 D0713 05:28:09.736960 700060 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:09.742712 700060 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.742731 700060 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000960b40 4 D0713 05:28:09.742742 700060 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:09.743770 700060 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.743800 700060 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000960b40 5 D0713 05:28:09.743810 700060 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:09.743863 700060 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.743876 700060 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000960b40 6 D0713 05:28:09.743883 700060 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:09.744065 700060 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.744080 700060 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000960b40 7 D0713 05:28:09.744087 700060 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:09.744212 700060 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.744234 700060 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc000960b40 8 D0713 05:28:09.744245 700060 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:09.744468 700060 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.744496 700060 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc000960b40 9 D0713 05:28:09.744506 700060 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:09.744527 700060 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.744533 700060 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000960b40 10 D0713 05:28:09.744539 700060 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:09.752517 700060 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.752557 700060 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000960b40 11 D0713 05:28:09.752573 700060 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:09.755080 700060 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.755125 700060 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc000960b40 12 D0713 05:28:09.755140 700060 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:09.755187 700060 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.755209 700060 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc000960b40 13 D0713 05:28:09.755222 700060 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:09.756072 700060 task_signals.go:470] [ 1199: 1199] Notified of signal 23 D0713 05:28:09.756164 700060 task_signals.go:220] [ 1199: 1199] Signal 23: delivering to handler D0713 05:28:09.763766 700060 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.763804 700060 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000960b40 14 D0713 05:28:09.763820 700060 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:09.763912 700060 task_exit.go:204] [ 1199: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.763986 700060 task_exit.go:204] [ 1199: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.764009 700060 task_signals.go:204] [ 1199: 1201] Signal 1199, PID: 1201, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.764039 700060 task_exit.go:204] [ 1199: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.764045 700060 task_exit.go:204] [ 1199: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.764048 700060 task_exit.go:204] [ 1199: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.764058 700060 task_signals.go:204] [ 1199: 1200] Signal 1199, PID: 1200, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.764068 700060 task_exit.go:204] [ 1199: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.764076 700060 task_exit.go:204] [ 1199: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.764082 700060 task_exit.go:204] [ 1199: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.764094 700060 task_signals.go:204] [ 1199: 1202] Signal 1199, PID: 1202, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.764105 700060 task_exit.go:204] [ 1199: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.764113 700060 task_exit.go:204] [ 1199: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.764118 700060 task_exit.go:204] [ 1199: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.764128 700060 task_signals.go:204] [ 1199: 1203] Signal 1199, PID: 1203, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.764139 700060 task_exit.go:204] [ 1199: 1203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.765364 700060 task_exit.go:204] [ 1199: 1203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.765399 700060 task_exit.go:204] [ 1199: 1203] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.765418 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.765443 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.765454 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.765531 700060 task_exit.go:204] [ 1199: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.766391 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.768054 700060 syscalls.go:262] [ 1204: 1204] Allocating stack with size of 8388608 bytes D0713 05:28:09.768220 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.769512 700060 usertrap_amd64.go:212] [ 1204: 1204] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.769572 700060 usertrap_amd64.go:106] [ 1204: 1204] Map a usertrap vma at 60000 D0713 05:28:09.769658 700060 usertrap_amd64.go:122] [ 1204: 1204] Allocate a new trap: 0xc0008692c0 1 D0713 05:28:09.769692 700060 usertrap_amd64.go:225] [ 1204: 1204] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:09.769989 700060 usertrap_amd64.go:212] [ 1204: 1204] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.770006 700060 usertrap_amd64.go:122] [ 1204: 1204] Allocate a new trap: 0xc0008692c0 2 D0713 05:28:09.770016 700060 usertrap_amd64.go:225] [ 1204: 1204] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:09.770711 700060 usertrap_amd64.go:212] [ 1204: 1204] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.770761 700060 usertrap_amd64.go:122] [ 1204: 1204] Allocate a new trap: 0xc0008692c0 3 D0713 05:28:09.770776 700060 usertrap_amd64.go:225] [ 1204: 1204] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:09.778618 700060 usertrap_amd64.go:212] [ 1204: 1204] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.778669 700060 usertrap_amd64.go:122] [ 1204: 1204] Allocate a new trap: 0xc0008692c0 4 D0713 05:28:09.778683 700060 usertrap_amd64.go:225] [ 1204: 1204] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:09.779779 700060 usertrap_amd64.go:212] [ 1204: 1204] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.779809 700060 usertrap_amd64.go:122] [ 1204: 1204] Allocate a new trap: 0xc0008692c0 5 D0713 05:28:09.779820 700060 usertrap_amd64.go:225] [ 1204: 1204] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:09.781743 700060 usertrap_amd64.go:212] [ 1204: 1204] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.781771 700060 usertrap_amd64.go:122] [ 1204: 1204] Allocate a new trap: 0xc0008692c0 6 D0713 05:28:09.781783 700060 usertrap_amd64.go:225] [ 1204: 1204] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:09.782273 700060 usertrap_amd64.go:212] [ 1204: 1204] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.782326 700060 usertrap_amd64.go:122] [ 1204: 1204] Allocate a new trap: 0xc0008692c0 7 D0713 05:28:09.782346 700060 usertrap_amd64.go:225] [ 1204: 1204] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:09.782938 700060 usertrap_amd64.go:212] [ 1204: 1205] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.782969 700060 usertrap_amd64.go:122] [ 1204: 1205] Allocate a new trap: 0xc0008692c0 8 D0713 05:28:09.782980 700060 usertrap_amd64.go:225] [ 1204: 1205] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:09.783306 700060 usertrap_amd64.go:212] [ 1204: 1205] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.783336 700060 usertrap_amd64.go:122] [ 1204: 1205] Allocate a new trap: 0xc0008692c0 9 D0713 05:28:09.783350 700060 usertrap_amd64.go:225] [ 1204: 1205] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:09.783363 700060 usertrap_amd64.go:212] [ 1204: 1204] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.783369 700060 usertrap_amd64.go:122] [ 1204: 1204] Allocate a new trap: 0xc0008692c0 10 D0713 05:28:09.783377 700060 usertrap_amd64.go:225] [ 1204: 1204] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:09.790972 700060 usertrap_amd64.go:212] [ 1204: 1204] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.791018 700060 usertrap_amd64.go:122] [ 1204: 1204] Allocate a new trap: 0xc0008692c0 11 D0713 05:28:09.791032 700060 usertrap_amd64.go:225] [ 1204: 1204] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:09.793658 700060 usertrap_amd64.go:212] [ 1204: 1205] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.793697 700060 usertrap_amd64.go:122] [ 1204: 1205] Allocate a new trap: 0xc0008692c0 12 D0713 05:28:09.793712 700060 usertrap_amd64.go:225] [ 1204: 1205] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:09.793769 700060 usertrap_amd64.go:212] [ 1204: 1205] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.793802 700060 usertrap_amd64.go:122] [ 1204: 1205] Allocate a new trap: 0xc0008692c0 13 D0713 05:28:09.793814 700060 usertrap_amd64.go:225] [ 1204: 1205] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:09.793860 700060 task_signals.go:470] [ 1204: 1204] Notified of signal 23 D0713 05:28:09.793903 700060 task_signals.go:220] [ 1204: 1204] Signal 23: delivering to handler D0713 05:28:09.801370 700060 usertrap_amd64.go:212] [ 1204: 1204] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.801414 700060 usertrap_amd64.go:122] [ 1204: 1204] Allocate a new trap: 0xc0008692c0 14 D0713 05:28:09.801428 700060 usertrap_amd64.go:225] [ 1204: 1204] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:09.802331 700060 task_exit.go:204] [ 1204: 1204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.802363 700060 task_exit.go:204] [ 1204: 1204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.802390 700060 task_signals.go:204] [ 1204: 1205] Signal 1204, PID: 1205, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.802415 700060 task_exit.go:204] [ 1204: 1205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.802421 700060 task_exit.go:204] [ 1204: 1205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.802425 700060 task_exit.go:204] [ 1204: 1205] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.802440 700060 task_signals.go:204] [ 1204: 1206] Signal 1204, PID: 1206, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.802447 700060 task_exit.go:204] [ 1204: 1206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.802451 700060 task_exit.go:204] [ 1204: 1206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.802455 700060 task_exit.go:204] [ 1204: 1206] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.802466 700060 task_signals.go:204] [ 1204: 1207] Signal 1204, PID: 1207, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.802476 700060 task_exit.go:204] [ 1204: 1207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.802481 700060 task_exit.go:204] [ 1204: 1207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.802490 700060 task_exit.go:204] [ 1204: 1207] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.802501 700060 task_signals.go:204] [ 1204: 1208] Signal 1204, PID: 1208, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.802511 700060 task_exit.go:204] [ 1204: 1208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.803519 700060 task_exit.go:204] [ 1204: 1208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.803542 700060 task_exit.go:204] [ 1204: 1208] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.803553 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.803574 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.803584 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.803675 700060 task_exit.go:204] [ 1204: 1204] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.804420 700060 task_stop.go:118] [ 5: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.805713 700060 syscalls.go:262] [ 1209: 1209] Allocating stack with size of 8388608 bytes D0713 05:28:09.805834 700060 task_stop.go:138] [ 5: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.807230 700060 usertrap_amd64.go:212] [ 1209: 1209] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.807271 700060 usertrap_amd64.go:106] [ 1209: 1209] Map a usertrap vma at 64000 D0713 05:28:09.807389 700060 usertrap_amd64.go:122] [ 1209: 1209] Allocate a new trap: 0xc002832810 1 D0713 05:28:09.807422 700060 usertrap_amd64.go:225] [ 1209: 1209] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:09.807833 700060 usertrap_amd64.go:212] [ 1209: 1209] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.807857 700060 usertrap_amd64.go:122] [ 1209: 1209] Allocate a new trap: 0xc002832810 2 D0713 05:28:09.807872 700060 usertrap_amd64.go:225] [ 1209: 1209] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:09.808741 700060 usertrap_amd64.go:212] [ 1209: 1209] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.808766 700060 usertrap_amd64.go:122] [ 1209: 1209] Allocate a new trap: 0xc002832810 3 D0713 05:28:09.808779 700060 usertrap_amd64.go:225] [ 1209: 1209] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:09.815283 700060 usertrap_amd64.go:212] [ 1209: 1209] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.815338 700060 usertrap_amd64.go:122] [ 1209: 1209] Allocate a new trap: 0xc002832810 4 D0713 05:28:09.815361 700060 usertrap_amd64.go:225] [ 1209: 1209] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:09.816674 700060 usertrap_amd64.go:212] [ 1209: 1209] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.816711 700060 usertrap_amd64.go:122] [ 1209: 1209] Allocate a new trap: 0xc002832810 5 D0713 05:28:09.816726 700060 usertrap_amd64.go:225] [ 1209: 1209] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:09.816776 700060 usertrap_amd64.go:212] [ 1209: 1209] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.816792 700060 usertrap_amd64.go:122] [ 1209: 1209] Allocate a new trap: 0xc002832810 6 D0713 05:28:09.816800 700060 usertrap_amd64.go:225] [ 1209: 1209] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:09.817158 700060 usertrap_amd64.go:212] [ 1209: 1209] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.817179 700060 usertrap_amd64.go:122] [ 1209: 1209] Allocate a new trap: 0xc002832810 7 D0713 05:28:09.817186 700060 usertrap_amd64.go:225] [ 1209: 1209] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:09.817336 700060 usertrap_amd64.go:212] [ 1209: 1210] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.817359 700060 usertrap_amd64.go:122] [ 1209: 1210] Allocate a new trap: 0xc002832810 8 D0713 05:28:09.817369 700060 usertrap_amd64.go:225] [ 1209: 1210] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:09.817583 700060 usertrap_amd64.go:212] [ 1209: 1210] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.817609 700060 usertrap_amd64.go:122] [ 1209: 1210] Allocate a new trap: 0xc002832810 9 D0713 05:28:09.817621 700060 usertrap_amd64.go:225] [ 1209: 1210] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:09.817924 700060 usertrap_amd64.go:212] [ 1209: 1209] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.817975 700060 usertrap_amd64.go:122] [ 1209: 1209] Allocate a new trap: 0xc002832810 10 D0713 05:28:09.817990 700060 usertrap_amd64.go:225] [ 1209: 1209] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:09.818328 700060 usertrap_amd64.go:212] [ 1209: 1210] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.818356 700060 usertrap_amd64.go:122] [ 1209: 1210] Allocate a new trap: 0xc002832810 11 D0713 05:28:09.818369 700060 usertrap_amd64.go:225] [ 1209: 1210] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:09.818426 700060 usertrap_amd64.go:212] [ 1209: 1210] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.818446 700060 usertrap_amd64.go:122] [ 1209: 1210] Allocate a new trap: 0xc002832810 12 D0713 05:28:09.818455 700060 usertrap_amd64.go:225] [ 1209: 1210] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:09.818497 700060 task_signals.go:470] [ 1209: 1209] Notified of signal 23 D0713 05:28:09.818562 700060 task_signals.go:220] [ 1209: 1209] Signal 23: delivering to handler D0713 05:28:09.826102 700060 usertrap_amd64.go:212] [ 1209: 1209] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.826273 700060 usertrap_amd64.go:122] [ 1209: 1209] Allocate a new trap: 0xc002832810 13 D0713 05:28:09.826300 700060 usertrap_amd64.go:225] [ 1209: 1209] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:09.828984 700060 task_signals.go:470] [ 1209: 1209] Notified of signal 23 D0713 05:28:09.829045 700060 task_signals.go:220] [ 1209: 1209] Signal 23: delivering to handler D0713 05:28:09.837852 700060 usertrap_amd64.go:212] [ 1209: 1209] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.837896 700060 usertrap_amd64.go:122] [ 1209: 1209] Allocate a new trap: 0xc002832810 14 D0713 05:28:09.837913 700060 usertrap_amd64.go:225] [ 1209: 1209] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:09.837970 700060 task_exit.go:204] [ 1209: 1209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.838004 700060 task_exit.go:204] [ 1209: 1209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.838033 700060 task_signals.go:204] [ 1209: 1210] Signal 1209, PID: 1210, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.838064 700060 task_exit.go:204] [ 1209: 1210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.838072 700060 task_exit.go:204] [ 1209: 1210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.838078 700060 task_exit.go:204] [ 1209: 1210] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.838095 700060 task_signals.go:204] [ 1209: 1211] Signal 1209, PID: 1211, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.838116 700060 task_exit.go:204] [ 1209: 1211] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.838124 700060 task_exit.go:204] [ 1209: 1211] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.838129 700060 task_exit.go:204] [ 1209: 1211] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.838142 700060 task_signals.go:204] [ 1209: 1212] Signal 1209, PID: 1212, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.838152 700060 task_exit.go:204] [ 1209: 1212] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.838160 700060 task_exit.go:204] [ 1209: 1212] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.838165 700060 task_exit.go:204] [ 1209: 1212] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.838185 700060 task_signals.go:204] [ 1209: 1213] Signal 1209, PID: 1213, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.838209 700060 task_exit.go:204] [ 1209: 1213] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.839284 700060 task_exit.go:204] [ 1209: 1213] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.839338 700060 task_exit.go:204] [ 1209: 1213] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.839363 700060 task_signals.go:470] [ 5: 5] Notified of signal 17 D0713 05:28:09.839441 700060 task_signals.go:179] [ 5: 5] Restarting syscall 202: interrupted by signal 17 D0713 05:28:09.839467 700060 task_signals.go:220] [ 5: 5] Signal 17: delivering to handler D0713 05:28:09.839652 700060 task_exit.go:204] [ 1209: 1209] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.840542 700060 task_stop.go:118] [ 5: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.841908 700060 syscalls.go:262] [ 1214: 1214] Allocating stack with size of 8388608 bytes D0713 05:28:09.842022 700060 task_stop.go:138] [ 5: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.843666 700060 usertrap_amd64.go:212] [ 1214: 1214] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.843709 700060 usertrap_amd64.go:106] [ 1214: 1214] Map a usertrap vma at 66000 D0713 05:28:09.844045 700060 usertrap_amd64.go:122] [ 1214: 1214] Allocate a new trap: 0xc000869500 1 D0713 05:28:09.844090 700060 usertrap_amd64.go:225] [ 1214: 1214] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:09.844517 700060 usertrap_amd64.go:212] [ 1214: 1214] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.844551 700060 usertrap_amd64.go:122] [ 1214: 1214] Allocate a new trap: 0xc000869500 2 D0713 05:28:09.844566 700060 usertrap_amd64.go:225] [ 1214: 1214] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:09.845344 700060 usertrap_amd64.go:212] [ 1214: 1214] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.845371 700060 usertrap_amd64.go:122] [ 1214: 1214] Allocate a new trap: 0xc000869500 3 D0713 05:28:09.845384 700060 usertrap_amd64.go:225] [ 1214: 1214] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:09.856004 700060 usertrap_amd64.go:212] [ 1214: 1214] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.856041 700060 usertrap_amd64.go:122] [ 1214: 1214] Allocate a new trap: 0xc000869500 4 D0713 05:28:09.856055 700060 usertrap_amd64.go:225] [ 1214: 1214] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:09.857259 700060 usertrap_amd64.go:212] [ 1214: 1214] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.857297 700060 usertrap_amd64.go:122] [ 1214: 1214] Allocate a new trap: 0xc000869500 5 D0713 05:28:09.857310 700060 usertrap_amd64.go:225] [ 1214: 1214] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:09.857796 700060 usertrap_amd64.go:212] [ 1214: 1214] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.857824 700060 usertrap_amd64.go:122] [ 1214: 1214] Allocate a new trap: 0xc000869500 6 D0713 05:28:09.857834 700060 usertrap_amd64.go:225] [ 1214: 1214] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:09.858342 700060 usertrap_amd64.go:212] [ 1214: 1214] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.858478 700060 usertrap_amd64.go:122] [ 1214: 1214] Allocate a new trap: 0xc000869500 7 D0713 05:28:09.858506 700060 usertrap_amd64.go:225] [ 1214: 1214] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:09.858696 700060 usertrap_amd64.go:212] [ 1214: 1215] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.858729 700060 usertrap_amd64.go:122] [ 1214: 1215] Allocate a new trap: 0xc000869500 8 D0713 05:28:09.858741 700060 usertrap_amd64.go:225] [ 1214: 1215] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:09.858921 700060 usertrap_amd64.go:212] [ 1214: 1215] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.858962 700060 usertrap_amd64.go:122] [ 1214: 1215] Allocate a new trap: 0xc000869500 9 D0713 05:28:09.858973 700060 usertrap_amd64.go:225] [ 1214: 1215] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:09.859327 700060 usertrap_amd64.go:212] [ 1214: 1217] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.859356 700060 usertrap_amd64.go:122] [ 1214: 1217] Allocate a new trap: 0xc000869500 10 D0713 05:28:09.859370 700060 usertrap_amd64.go:225] [ 1214: 1217] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:09.859388 700060 usertrap_amd64.go:212] [ 1214: 1215] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.859407 700060 usertrap_amd64.go:122] [ 1214: 1215] Allocate a new trap: 0xc000869500 11 D0713 05:28:09.859416 700060 usertrap_amd64.go:225] [ 1214: 1215] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:09.859511 700060 usertrap_amd64.go:212] [ 1214: 1215] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.859527 700060 usertrap_amd64.go:122] [ 1214: 1215] Allocate a new trap: 0xc000869500 12 D0713 05:28:09.859538 700060 usertrap_amd64.go:225] [ 1214: 1215] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:09.859576 700060 task_signals.go:470] [ 1214: 1214] Notified of signal 23 D0713 05:28:09.859603 700060 task_signals.go:220] [ 1214: 1214] Signal 23: delivering to handler D0713 05:28:09.867537 700060 usertrap_amd64.go:212] [ 1214: 1214] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.867591 700060 usertrap_amd64.go:122] [ 1214: 1214] Allocate a new trap: 0xc000869500 13 D0713 05:28:09.867606 700060 usertrap_amd64.go:225] [ 1214: 1214] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:09.870546 700060 task_signals.go:470] [ 1214: 1214] Notified of signal 23 D0713 05:28:09.870656 700060 task_signals.go:220] [ 1214: 1214] Signal 23: delivering to handler D0713 05:28:09.877559 700060 task_signals.go:309] [ 1214: 1214] failed to restore from a signal frame: bad address D0713 05:28:09.877614 700060 task_signals.go:470] [ 1214: 1214] Notified of signal 11 D0713 05:28:09.877632 700060 task_signals.go:220] [ 1214: 1214] Signal 11: delivering to handler W0713 05:28:09.909543 700209 util.go:64] FATAL ERROR: waiting on pid 5: waiting on PID 5 in sandbox "ci-gvisor-systrap-1-cover-test-1": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 5: waiting on PID 5 in sandbox "ci-gvisor-systrap-1-cover-test-1": urpc method "containerManager.WaitPID" failed: EOF W0713 05:28:09.909720 700209 main.go:274] Failure to execute command, err: 1 D0713 05:28:09.921453 1 connection.go:127] sock read failed, closing connection: EOF W0713 05:28:09.921495 700032 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-cover-test-1" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. I0713 05:28:09.921582 1 gofer.go:319] All lisafs servers exited. I0713 05:28:09.921621 1 main.go:265] Exiting with status: 0 D0713 05:28:09.927525 700032 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-cover-test-1 D0713 05:28:09.927621 700032 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-cover-test-1 D0713 05:28:09.927631 700032 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-cover-test-1 D0713 05:28:09.927638 700032 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.927745 700032 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-cover-test-1, PID: 700053 D0713 05:28:09.930504 700032 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.930593 700032 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.930691 700032 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.930752 700032 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.930768 700032 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.930786 700032 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.930799 700032 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.930836 700032 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.930893 700032 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.930905 700032 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.930967 700032 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.930988 700032 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.931001 700032 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-cover-test-1" D0713 05:28:09.931039 700032 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-cover-test-1" I0713 05:28:09.931651 700032 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0713 05:28:09.982241 701079 main.go:230] *************************** I0713 05:28:09.982318 701079 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-test-1] I0713 05:28:09.982363 701079 main.go:232] Version 0.0.0 I0713 05:28:09.982387 701079 main.go:233] GOOS: linux I0713 05:28:09.982411 701079 main.go:234] GOARCH: amd64 I0713 05:28:09.982450 701079 main.go:235] PID: 701079 I0713 05:28:09.982475 701079 main.go:236] UID: 0, GID: 0 I0713 05:28:09.982616 701079 main.go:237] Configuration: I0713 05:28:09.982677 701079 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root I0713 05:28:09.982734 701079 main.go:239] Platform: systrap I0713 05:28:09.982778 701079 main.go:240] FileAccess: shared I0713 05:28:09.982832 701079 main.go:241] Directfs: true I0713 05:28:09.982875 701079 main.go:242] Overlay: none I0713 05:28:09.982918 701079 main.go:243] Network: sandbox, logging: false I0713 05:28:09.982962 701079 main.go:244] Strace: false, max size: 1024, syscalls: I0713 05:28:09.983003 701079 main.go:245] IOURING: false I0713 05:28:09.983055 701079 main.go:246] Debug: true I0713 05:28:09.983090 701079 main.go:247] Systemd: false I0713 05:28:09.983136 701079 main.go:248] *************************** D0713 05:28:09.983216 701079 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 05:28:09.983372 701079 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-cover-test-1": file does not exist loading container "ci-gvisor-systrap-1-cover-test-1": file does not exist W0713 05:28:09.983472 701079 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-cover-test-1"]: exit status 128 I0713 05:28:09.982241 701079 main.go:230] *************************** I0713 05:28:09.982318 701079 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-test-1] I0713 05:28:09.982363 701079 main.go:232] Version 0.0.0 I0713 05:28:09.982387 701079 main.go:233] GOOS: linux I0713 05:28:09.982411 701079 main.go:234] GOARCH: amd64 I0713 05:28:09.982450 701079 main.go:235] PID: 701079 I0713 05:28:09.982475 701079 main.go:236] UID: 0, GID: 0 I0713 05:28:09.982616 701079 main.go:237] Configuration: I0713 05:28:09.982677 701079 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root I0713 05:28:09.982734 701079 main.go:239] Platform: systrap I0713 05:28:09.982778 701079 main.go:240] FileAccess: shared I0713 05:28:09.982832 701079 main.go:241] Directfs: true I0713 05:28:09.982875 701079 main.go:242] Overlay: none I0713 05:28:09.982918 701079 main.go:243] Network: sandbox, logging: false I0713 05:28:09.982962 701079 main.go:244] Strace: false, max size: 1024, syscalls: I0713 05:28:09.983003 701079 main.go:245] IOURING: false I0713 05:28:09.983055 701079 main.go:246] Debug: true I0713 05:28:09.983090 701079 main.go:247] Systemd: false I0713 05:28:09.983136 701079 main.go:248] *************************** D0713 05:28:09.983216 701079 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 05:28:09.983372 701079 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-cover-test-1": file does not exist loading container "ci-gvisor-systrap-1-cover-test-1": file does not exist W0713 05:28:09.983472 701079 main.go:274] Failure to execute command, err: 1 [11548303.445978] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.012030] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.078579] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.134946] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.388423] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.442059] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.509579] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.182613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.228614] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.249852] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.270396] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.080494] warn_bad_vsyscall: 69 callbacks suppressed [11548311.080498] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.131994] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.183761] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.207733] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548326.195752] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.033861] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.883771] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.718811] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.764692] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.802193] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.003147] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.061042] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.083321] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.123123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.557059] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.614792] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.654451] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.900936] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.950630] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548350.007839] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.826680] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.880328] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.934074] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.272328] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.322197] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.361580] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.288522] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.327273] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.370594] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.489698] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.541048] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.609626] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.631505] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.250609] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.296008] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.297139] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.354078] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.375823] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.830961] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.909476] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.972469] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.174820] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.216089] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548391.283262] warn_bad_vsyscall: 1 callbacks suppressed [11548391.283264] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.329989] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.374640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548393.205978] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.255260] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.299080] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.344484] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.405320] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.464950] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.467363] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.255243] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.318628] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.319151] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.399578] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.401766] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.568699] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.919607] warn_bad_vsyscall: 3 callbacks suppressed [11548416.919610] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.966950] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.989006] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548417.034408] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.811451] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.860253] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.886942] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.928112] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.778887] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.820893] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.842334] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880084] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880903] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.508111] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.601445] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.602653] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.704447] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.705345] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.826999] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872284] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872375] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.986065] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.258456] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.300258] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.349378] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548474.517614] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.564789] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.587128] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.638151] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548480.604311] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.644087] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.687806] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.689290] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548484.123787] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.180672] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.239780] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548493.278360] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328236] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328600] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.390304] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.833382] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.961149] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548509.063948] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548520.613294] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.659518] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.708570] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548526.299866] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.339536] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.402244] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.425302] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.894709] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.938050] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.982622] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.450297] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.505520] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.528534] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.568597] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548544.956800] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.013667] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.033643] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.085490] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548549.234345] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.282824] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.329949] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.534109] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.597324] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.621011] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.681465] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.886217] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.950142] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.998720] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.869926] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.934033] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.955035] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.014796] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.296125] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.353392] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.399746] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548570.911499] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.669130] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.735195] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.776546] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.660338] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.699761] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.746611] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.932572] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.972071] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.994399] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548597.034578] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.022991] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.090767] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.091012] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177700] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177834] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.557153] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.606340] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.653245] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.686798] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.776155] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.819898] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.872777] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.809818] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.860562] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.902531] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.707415] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.760809] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.817281] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.837170] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.856971] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.880580] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.901934] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.921867] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.942728] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.963710] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.234572] warn_bad_vsyscall: 60 callbacks suppressed [11548659.234577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.319640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.375122] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.395917] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.877517] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.920825] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.942925] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.984794] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548666.639541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.680685] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.721252] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548685.149430] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.193561] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.234314] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.259938] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.046303] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.090192] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.111864] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.155942] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.597615] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.643566] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.512636] warn_bad_vsyscall: 2 callbacks suppressed [11548693.512640] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.587898] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.622954] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.672410] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.860094] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.898007] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.935962] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.083950] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.139793] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.183343] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.433839] warn_bad_vsyscall: 4 callbacks suppressed [11548701.433843] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.486929] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.525603] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.154317] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.196722] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.240576] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.261222] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.863192] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.911865] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.965656] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.905248] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.941691] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.983975] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.279943] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.327248] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.389725] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.413266] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.107500] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.162576] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.212182] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.593451] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.640310] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.696914] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.087707] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.134560] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.378944] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.423937] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.443330] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.463024] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.482763] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.505914] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.525847] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.546368] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.567195] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.587657] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.371230] warn_bad_vsyscall: 29 callbacks suppressed [11548765.371234] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.416207] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.456858] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.014315] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.053783] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.097156] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548783.841479] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.890700] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.932657] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.698534] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.744861] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.765479] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.802565] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.823701] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548816.611166] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.660003] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.708264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.616862] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.656506] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.686639] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.730645] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.103497] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.175520] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.217584] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.239654] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.380393] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419346] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419914] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.482312] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.504801] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.673651] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548838.107208] warn_bad_vsyscall: 69 callbacks suppressed [11548838.107211] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.166865] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.212798] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.234075] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.515015] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573192] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573250] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.637396] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.856419] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.903599] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.043501] warn_bad_vsyscall: 3 callbacks suppressed [11548851.043505] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.091113] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.134490] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.651270] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.696335] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.749606] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.916650] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.958708] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548852.000342] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.093160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.147244] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.168810] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.275323] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.795133] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.856035] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.904442] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.933821] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.146784] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.215461] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.263431] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.250299] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.301702] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.322428] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.363670] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.387918] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.562614] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.605694] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.627575] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.667298] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.692069] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.739223] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.784533] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.785479] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.861757] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548914.066544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548920.546376] warn_bad_vsyscall: 3 callbacks suppressed [11548920.546380] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.598743] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.656217] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.789652] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.873526] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.930080] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.662584] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.704522] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.747412] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548941.905328] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.002937] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.026135] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.047304] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.070126] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.093651] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.118417] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.138954] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.161818] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.197908] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548947.008863] warn_bad_vsyscall: 29 callbacks suppressed [11548947.008867] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.117286] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.212764] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.279648] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.345439] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.439123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.226947] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.265920] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.306266] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.023857] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.083854] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.084666] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.162482] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.182136] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.202273] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.225957] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.248936] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.269819] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.291316] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.814852] warn_bad_vsyscall: 61 callbacks suppressed [11548984.814855] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.924203] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548999.981207] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.031437] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.075008] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.490779] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.548739] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.596976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.622828] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549003.408072] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.450273] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.493544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549011.127750] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.168732] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.204428] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.584759] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.637945] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.661027] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.703124] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.880815] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.931172] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.980221] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.112241] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.159181] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.184471] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.234060] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.289213] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.338880] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.384608] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.697534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.734874] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.790174] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.722197] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.769295] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.813981] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.670371] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.708511] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.749962] exe[743908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.269200] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.317692] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.341079] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.380507] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.807867] warn_bad_vsyscall: 1 callbacks suppressed [11549067.807871] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.870608] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.908220] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.669345] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.711360] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.754534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.604356] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.659869] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.706198] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549089.981820] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.040241] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.062834] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.120102] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549094.367870] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.417816] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.462962] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602597.777330] audit: type=1326 audit(1689206344.991:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602603.869164] audit: type=1326 audit(1689206351.083:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754999 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.285215] audit: type=1326 audit(1689206425.499:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=755000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.677713] audit: type=1326 audit(1689206425.891:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602696.843980] audit: type=1326 audit(1689206444.055:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=753602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602743.097537] audit: type=1326 audit(1689206490.311:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602743.122326] audit: type=1326 audit(1689206490.311:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602759.499374] audit: type=1326 audit(1689206506.710:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602854.344933] audit: type=1326 audit(1689206601.558:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602859.040813] audit: type=1326 audit(1689206606.254:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765875 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602884.867590] audit: type=1326 audit(1689206632.078:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=767807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602895.802192] audit: type=1326 audit(1689206643.014:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=750390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602921.417882] audit: type=1326 audit(1689206668.630:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602934.284216] audit: type=1326 audit(1689206681.494:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=763696 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602998.074154] audit: type=1326 audit(1689206745.286:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=771543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603001.490232] audit: type=1326 audit(1689206748.702:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772848 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603019.886473] exe[728911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603019.961263] exe[723449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.012456] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.033883] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.390766] audit: type=1326 audit(1689206767.602:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603082.847524] audit: type=1326 audit(1689206830.058:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=775665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603138.090907] audit: type=1326 audit(1689206885.302:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603172.298141] audit: type=1326 audit(1689206919.510:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777217 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603182.461434] audit: type=1326 audit(1689206929.674:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780255 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603243.896847] audit: type=1326 audit(1689206991.106:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603279.127507] audit: type=1326 audit(1689207026.338:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=787634 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603309.589653] audit: type=1326 audit(1689207056.802:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603335.471219] audit: type=1326 audit(1689207082.682:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=788938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603343.797267] audit: type=1326 audit(1689207091.010:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=790140 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603405.836680] audit: type=1326 audit(1689207153.046:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792319 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603420.441739] audit: type=1326 audit(1689207167.654:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603427.753376] audit: type=1326 audit(1689207174.966:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774364 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603505.176389] audit: type=1326 audit(1689207252.385:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796183 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603533.829677] audit: type=1326 audit(1689207281.041:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=797063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603562.278422] audit: type=1326 audit(1689207309.489:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603667.052521] audit: type=1326 audit(1689207414.261:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=805774 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603667.905373] audit: type=1326 audit(1689207415.113:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=807621 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603676.505802] audit: type=1326 audit(1689207423.717:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=806198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603684.820900] audit: type=1326 audit(1689207432.029:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=793728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603795.965747] audit: type=1326 audit(1689207543.177:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=812556 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603804.637990] audit: type=1326 audit(1689207551.849:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603810.551130] audit: type=1326 audit(1689207557.761:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810358 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603820.309874] audit: type=1326 audit(1689207567.521:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=811185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603836.504336] audit: type=1326 audit(1689207583.713:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=800972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603841.793876] audit: type=1326 audit(1689207589.005:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603870.199020] audit: type=1326 audit(1689207617.409:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603951.796356] audit: type=1326 audit(1689207699.005:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=816857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603957.195581] audit: type=1326 audit(1689207704.405:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817252 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603991.129069] audit: type=1326 audit(1689207738.337:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=819555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604091.585729] audit: type=1326 audit(1689207838.793:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604093.722432] audit: type=1326 audit(1689207840.933:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604119.143756] audit: type=1326 audit(1689207866.353:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=822836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604204.469045] audit: type=1326 audit(1689207951.676:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604217.655924] audit: type=1326 audit(1689207964.864:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=818547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604224.651590] audit: type=1326 audit(1689207971.860:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604234.352201] audit: type=1326 audit(1689207981.564:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604235.997704] audit: type=1326 audit(1689207983.208:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604256.614441] audit: type=1326 audit(1689208003.828:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604263.313503] audit: type=1326 audit(1689208010.524:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=828626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604308.646673] audit: type=1326 audit(1689208055.860:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831393 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604427.403379] audit: type=1326 audit(1689208174.616:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=833669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604450.026228] audit: type=1326 audit(1689208197.240:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=834371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604459.830108] audit: type=1326 audit(1689208207.040:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604476.678391] audit: type=1326 audit(1689208223.892:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829944 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604506.595388] audit: type=1326 audit(1689208253.808:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=836737 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604536.910472] audit: type=1326 audit(1689208284.124:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824480 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604588.801578] audit: type=1326 audit(1689208336.012:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604590.878115] audit: type=1326 audit(1689208338.088:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604613.330191] audit: type=1326 audit(1689208360.540:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=849945 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604648.014559] audit: type=1326 audit(1689208395.228:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=844081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604655.910760] audit: type=1326 audit(1689208403.124:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604731.191216] audit: type=1326 audit(1689208478.404:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=841978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604750.453981] audit: type=1326 audit(1689208497.664:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850369 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604790.297089] audit: type=1326 audit(1689208537.508:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=851838 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604911.917454] audit: type=1326 audit(1689208659.128:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=855574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604932.248331] audit: type=1326 audit(1689208679.459:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=856349 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604979.039220] audit: type=1326 audit(1689208726.251:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=854027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605001.217428] audit: type=1326 audit(1689208748.427:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605004.825105] audit: type=1326 audit(1689208752.035:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605073.388168] audit: type=1326 audit(1689208820.599:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605073.905125] audit: type=1326 audit(1689208821.115:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861403 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605096.082181] audit: type=1326 audit(1689208843.291:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605129.878423] audit: type=1326 audit(1689208877.087:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=866278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605177.031421] audit: type=1326 audit(1689208924.243:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865008 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605235.963087] exe[867632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bc192d40a cs:33 sp:7f06f0682ee8 ax:12 si:ffffffffff600000 di:559bc1999ff2 [11605242.250840] audit: type=1326 audit(1689208989.459:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605259.396277] exe[729169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.444946] exe[734784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.493436] exe[735065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605345.057961] audit: type=1326 audit(1689209092.267:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=867457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605366.290442] audit: type=1326 audit(1689209113.499:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=872748 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605379.568477] audit: type=1326 audit(1689209126.779:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=868919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605400.381802] audit: type=1326 audit(1689209147.591:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873868 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605499.168636] audit: type=1326 audit(1689209246.379:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873036 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605641.112938] audit: type=1326 audit(1689209388.322:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=878736 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605650.594619] audit: type=1326 audit(1689209397.802:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879055 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605769.011148] audit: type=1326 audit(1689209516.218:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897739 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605783.192934] audit: type=1326 audit(1689209530.402:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=888577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605785.006125] audit: type=1326 audit(1689209532.214:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=874679 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605792.566409] audit: type=1326 audit(1689209539.774:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=899333 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605803.584285] audit: type=1326 audit(1689209550.794:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=889127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605917.107175] audit: type=1326 audit(1689209664.314:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=900168 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605999.175587] audit: type=1326 audit(1689209746.386:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=903724 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606057.989861] audit: type=1326 audit(1689209805.198:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=908771 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606081.023977] audit: type=1326 audit(1689209828.234:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901681 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606081.049199] audit: type=1326 audit(1689209828.234:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606140.480349] audit: type=1326 audit(1689209887.690:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606161.551475] audit: type=1326 audit(1689209908.758:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606199.187532] audit: type=1326 audit(1689209946.394:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=916010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606218.913397] audit: type=1326 audit(1689209966.122:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922661 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606232.077547] audit: type=1326 audit(1689209979.282:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=923826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606380.343966] audit: type=1326 audit(1689210127.553:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606411.655428] audit: type=1326 audit(1689210158.861:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927181 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606523.891076] audit: type=1326 audit(1689210271.097:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606544.833841] audit: type=1326 audit(1689210292.041:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932874 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606553.082384] audit: type=1326 audit(1689210300.289:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=934463 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606576.113741] audit: type=1326 audit(1689210323.321:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=939578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606603.669625] audit: type=1326 audit(1689210350.877:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918032 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606666.104511] audit: type=1326 audit(1689210413.313:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=938428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606700.273078] audit: type=1326 audit(1689210447.481:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606722.409710] audit: type=1326 audit(1689210469.617:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=944587 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606723.591484] audit: type=1326 audit(1689210470.797:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918004 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606726.625428] audit: type=1326 audit(1689210473.833:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=925543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606749.842751] audit: type=1326 audit(1689210497.049:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=945425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606774.216268] audit: type=1326 audit(1689210521.421:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606775.272993] audit: type=1326 audit(1689210522.481:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946844 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606808.022043] audit: type=1326 audit(1689210555.229:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=942712 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606825.235825] audit: type=1326 audit(1689210572.441:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=943616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606903.854733] audit: type=1326 audit(1689210651.061:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=951196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606950.408866] audit: type=1326 audit(1689210697.617:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607046.030686] audit: type=1326 audit(1689210793.237:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=955433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607082.153088] audit: type=1326 audit(1689210829.361:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=963715 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607091.177801] audit: type=1326 audit(1689210838.384:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607204.949220] audit: type=1326 audit(1689210952.160:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961511 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607214.149455] audit: type=1326 audit(1689210961.360:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607234.203101] audit: type=1326 audit(1689210981.412:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=965279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607246.591122] audit: type=1326 audit(1689210993.800:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607346.908337] audit: type=1326 audit(1689211094.116:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607347.810535] audit: type=1326 audit(1689211095.020:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=976275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607373.022204] audit: type=1326 audit(1689211120.232:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607377.243731] audit: type=1326 audit(1689211124.452:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969402 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607487.048913] audit: type=1326 audit(1689211234.256:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946299 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607489.734138] audit: type=1326 audit(1689211236.944:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977298 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607499.561410] audit: type=1326 audit(1689211246.772:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607519.191537] audit: type=1326 audit(1689211266.400:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607624.457049] audit: type=1326 audit(1689211371.664:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=985128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607631.705291] audit: type=1326 audit(1689211378.916:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=983126 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607638.204050] audit: type=1326 audit(1689211385.412:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979517 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607751.083724] audit: type=1326 audit(1689211498.292:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=989206 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607766.193883] audit: type=1326 audit(1689211513.404:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988722 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607770.820805] audit: type=1326 audit(1689211518.028:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=972203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607889.548013] audit: type=1326 audit(1689211636.755:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=995356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607890.272191] audit: type=1326 audit(1689211637.479:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984084 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607892.217788] audit: type=1326 audit(1689211639.427:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=994449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607973.414133] audit: type=1326 audit(1689211720.623:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607997.840992] audit: type=1326 audit(1689211745.047:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608009.823096] exe[880088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.862814] exe[908958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.905875] exe[880060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7a7858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608031.274871] audit: type=1326 audit(1689211778.483:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998191 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608034.038701] audit: type=1326 audit(1689211781.247:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998422 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608075.873755] audit: type=1326 audit(1689211823.083:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992937 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608174.269361] audit: type=1326 audit(1689211921.475:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608175.997697] audit: type=1326 audit(1689211923.203:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608317.934996] audit: type=1326 audit(1689212065.143:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16671 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608318.010584] audit: type=1326 audit(1689212065.219:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16326 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608345.573784] audit: type=1326 audit(1689212092.779:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11133 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608451.296340] audit: type=1326 audit(1689212198.503:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29829 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608460.035472] audit: type=1326 audit(1689212207.243:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608462.176738] audit: type=1326 audit(1689212209.383:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25141 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608503.267767] audit: type=1326 audit(1689212250.475:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=34498 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608533.390892] audit: type=1326 audit(1689212280.598:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999989 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608586.343765] audit: type=1326 audit(1689212333.550:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11132 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608603.172815] audit: type=1326 audit(1689212350.378:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608604.375648] audit: type=1326 audit(1689212351.582:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608625.227797] audit: type=1326 audit(1689212372.434:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608653.653041] audit: type=1326 audit(1689212400.858:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996310 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608746.810007] audit: type=1326 audit(1689212494.014:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608759.068622] audit: type=1326 audit(1689212506.274:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608844.060417] audit: type=1326 audit(1689212591.266:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47509 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608849.979155] audit: type=1326 audit(1689212597.186:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26927 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608866.192620] audit: type=1326 audit(1689212613.398:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50432 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608900.419588] audit: type=1326 audit(1689212647.626:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=48313 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609041.941064] audit: type=1326 audit(1689212789.146:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609043.267962] audit: type=1326 audit(1689212790.474:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=51808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609101.039399] exe[19846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.200826] exe[42029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.233088] exe[21925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.359654] exe[14202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609114.859756] audit: type=1326 audit(1689212862.066:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=53392 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609136.468568] audit: type=1326 audit(1689212883.674:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=63106 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609184.539557] audit: type=1326 audit(1689212931.746:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55835 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609224.389789] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.508861] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.664605] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.692561] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.721718] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.758715] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.820055] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.852642] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.874621] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.926286] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609296.412170] audit: type=1326 audit(1689213043.617:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=38807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609346.942415] audit: type=1326 audit(1689213094.145:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=67199 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609386.199827] audit: type=1326 audit(1689213133.405:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=70379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609407.497500] audit: type=1326 audit(1689213154.701:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=80674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609489.512442] audit: type=1326 audit(1689213236.717:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=78397 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609536.734812] audit: type=1326 audit(1689213283.937:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=44670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609540.467947] audit: type=1326 audit(1689213287.673:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609578.029249] audit: type=1326 audit(1689213325.233:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609580.700973] audit: type=1326 audit(1689213327.905:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609630.673391] audit: type=1326 audit(1689213377.877:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609672.894466] audit: type=1326 audit(1689213420.097:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609673.764769] audit: type=1326 audit(1689213420.969:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56076 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609682.185992] audit: type=1326 audit(1689213429.389:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=93458 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609689.245620] audit: type=1326 audit(1689213436.449:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=39787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609704.620136] audit: type=1326 audit(1689213451.825:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103151 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609718.303851] audit: type=1326 audit(1689213465.509:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609732.024113] audit: type=1326 audit(1689213479.229:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609746.654594] audit: type=1326 audit(1689213493.857:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=99508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609891.802556] audit: type=1326 audit(1689213639.005:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=107746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609980.959613] audit: type=1326 audit(1689213728.164:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=111400 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610037.921958] warn_bad_vsyscall: 57 callbacks suppressed [11610037.921961] exe[104886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cf1f3e40a cs:33 sp:7f9740193ee8 ax:12 si:ffffffffff600000 di:557cf1faaff2 [11610091.078793] audit: type=1326 audit(1689213838.284:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=114972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610124.942162] audit: type=1326 audit(1689213872.148:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610177.285395] audit: type=1326 audit(1689213924.492:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102441 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610193.441605] audit: type=1326 audit(1689213940.648:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610225.810101] audit: type=1326 audit(1689213973.016:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123167 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610233.553409] audit: type=1326 audit(1689213980.760:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=121916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610256.024194] audit: type=1326 audit(1689214003.232:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128638 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610300.269297] audit: type=1326 audit(1689214047.476:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610367.800104] audit: type=1326 audit(1689214115.008:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128262 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610392.269170] audit: type=1326 audit(1689214139.476:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=129506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610463.704357] audit: type=1326 audit(1689214210.912:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610509.525530] audit: type=1326 audit(1689214256.732:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=133363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610534.233051] audit: type=1326 audit(1689214281.440:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=134147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610535.552490] audit: type=1326 audit(1689214282.760:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102360 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610558.818901] audit: type=1326 audit(1689214306.024:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138968 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610563.001154] audit: type=1326 audit(1689214310.208:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125930 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610652.067752] audit: type=1326 audit(1689214399.272:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610675.976391] audit: type=1326 audit(1689214423.180:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138768 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610794.201252] audit: type=1326 audit(1689214541.407:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146110 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610817.416788] audit: type=1326 audit(1689214564.623:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=147787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610824.164743] audit: type=1326 audit(1689214571.371:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610917.045624] audit: type=1326 audit(1689214664.247:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=155879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610935.100843] audit: type=1326 audit(1689214682.307:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=154665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610957.386648] audit: type=1326 audit(1689214704.591:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=160285 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611044.973755] audit: type=1326 audit(1689214792.179:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104427 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611052.355082] exe[161359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.396817] exe[161402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.417215] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.458817] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9dd858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611057.686547] audit: type=1326 audit(1689214804.891:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159476 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611080.561894] audit: type=1326 audit(1689214827.767:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611091.751769] audit: type=1326 audit(1689214838.955:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=163210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611106.510657] audit: type=1326 audit(1689214853.715:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164175 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611206.621679] audit: type=1326 audit(1689214953.827:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162899 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611226.105804] audit: type=1326 audit(1689214973.311:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=157532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611328.860902] audit: type=1326 audit(1689215076.067:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=136219 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611349.685728] audit: type=1326 audit(1689215096.891:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166089 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611355.989960] audit: type=1326 audit(1689215103.195:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611470.897001] exe[173131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611470.982692] exe[172685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611471.068495] exe[172788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611491.624312] audit: type=1326 audit(1689215238.826:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611498.281194] audit: type=1326 audit(1689215245.486:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171656 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611545.887586] audit: type=1326 audit(1689215293.090:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611556.965422] audit: type=1326 audit(1689215304.170:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611636.098091] audit: type=1326 audit(1689215383.302:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611641.171130] audit: type=1326 audit(1689215388.374:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176464 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611712.598686] audit: type=1326 audit(1689215459.802:770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611779.405216] audit: type=1326 audit(1689215526.606:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=183629 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611784.275845] audit: type=1326 audit(1689215531.478:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611807.175705] audit: type=1326 audit(1689215554.378:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=139924 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611845.278909] exe[175719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.131823] exe[175495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.132343] exe[62220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.255247] exe[192224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611865.951902] exe[193267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96258cee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.843870] exe[194427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.849440] exe[193278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.684536] exe[193231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.685047] exe[193276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611923.773068] audit: type=1326 audit(1689215670.974:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611927.131634] audit: type=1326 audit(1689215674.334:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192265 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611946.855512] audit: type=1326 audit(1689215694.058:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612069.445142] audit: type=1326 audit(1689215816.646:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199539 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612092.184084] audit: type=1326 audit(1689215839.386:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205940 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612109.628298] audit: type=1326 audit(1689215856.830:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=167586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612169.655524] audit: type=1326 audit(1689215916.857:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=179867 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612196.158283] audit: type=1326 audit(1689215943.361:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612321.757529] audit: type=1326 audit(1689216068.961:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612338.198911] audit: type=1326 audit(1689216085.401:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210033 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612341.930437] audit: type=1326 audit(1689216089.133:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612480.723412] audit: type=1326 audit(1689216227.925:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612484.182272] audit: type=1326 audit(1689216231.385:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215515 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612623.704171] audit: type=1326 audit(1689216370.905:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612627.491761] audit: type=1326 audit(1689216374.693:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219947 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612650.811661] audit: type=1326 audit(1689216398.017:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612725.881937] audit: type=1326 audit(1689216473.081:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215502 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612768.073479] audit: type=1326 audit(1689216515.273:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612911.907957] exe[230755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784c9cc40a cs:33 sp:7f8d98f46ee8 ax:12 si:ffffffffff600000 di:55784ca38ff2 [11612912.026179] audit: type=1326 audit(1689216659.232:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=229411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612928.029305] audit: type=1326 audit(1689216675.232:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612933.884371] audit: type=1326 audit(1689216681.088:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=237418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613007.977947] audit: type=1326 audit(1689216755.180:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242949 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613034.707467] exe[210137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed66be340a cs:33 sp:7fd40805cee8 ax:12 si:ffffffffff600000 di:55ed66c4fff2 [11613067.683364] audit: type=1326 audit(1689216814.888:796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=238399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613090.757129] audit: type=1326 audit(1689216837.960:797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613156.842452] audit: type=1326 audit(1689216904.048:798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162031 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613176.892347] audit: type=1326 audit(1689216924.096:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613225.327240] audit: type=1326 audit(1689216972.532:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613257.820594] audit: type=1326 audit(1689217005.024:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248201 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613259.764460] exe[113089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.896766] exe[129485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.994509] exe[113108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613260.035649] exe[167068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613367.064209] audit: type=1326 audit(1689217114.268:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=257164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613389.920266] audit: type=1326 audit(1689217137.124:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=265247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613400.171681] audit: type=1326 audit(1689217147.376:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=261413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613423.461311] audit: type=1326 audit(1689217170.664:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=267746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613556.820936] audit: type=1326 audit(1689217304.024:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=269567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613639.322076] audit: type=1326 audit(1689217386.523:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=271970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613662.359245] audit: type=1326 audit(1689217409.563:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=279508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613699.545408] audit: type=1326 audit(1689217446.747:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=274933 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613729.742873] audit: type=1326 audit(1689217476.947:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=227591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11613758.457839] audit: type=1326 audit(1689217505.659:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=208877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613841.828755] audit: type=1326 audit(1689217589.031:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613865.039411] audit: type=1326 audit(1689217612.243:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=285941 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613909.215817] exe[280649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613909.285023] exe[281621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613910.102687] exe[280647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613911.927175] audit: type=1326 audit(1689217659.131:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=283958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613926.880021] audit: type=1326 audit(1689217674.083:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=250982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613951.214334] audit: type=1326 audit(1689217698.415:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613994.384142] audit: type=1326 audit(1689217741.587:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=289847 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614054.357636] audit: type=1326 audit(1689217801.559:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614197.565657] audit: type=1326 audit(1689217944.767:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293965 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614243.930801] audit: type=1326 audit(1689217991.131:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295865 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614340.962187] audit: type=1326 audit(1689218088.162:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614378.700022] audit: type=1326 audit(1689218125.902:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302653 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614436.168021] audit: type=1326 audit(1689218183.370:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=306526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614488.028688] audit: type=1326 audit(1689218235.230:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614531.437813] audit: type=1326 audit(1689218278.638:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=313198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614546.864834] audit: type=1326 audit(1689218294.066:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319188 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614567.377282] audit: type=1326 audit(1689218314.578:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=299618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614623.636542] audit: type=1326 audit(1689218370.838:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614629.720322] audit: type=1326 audit(1689218376.922:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614697.032081] audit: type=1326 audit(1689218444.234:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614708.565361] audit: type=1326 audit(1689218455.766:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=321370 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614725.059201] audit: type=1326 audit(1689218472.258:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614725.083797] audit: type=1326 audit(1689218472.270:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614763.316197] audit: type=1326 audit(1689218510.518:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614783.657848] audit: type=1326 audit(1689218530.858:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.377379] audit: type=1326 audit(1689218572.578:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.954441] audit: type=1326 audit(1689218573.154:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614826.473984] audit: type=1326 audit(1689218573.674:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614849.192210] audit: type=1326 audit(1689218596.394:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347434 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614869.432839] audit: type=1326 audit(1689218616.634:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614904.547842] audit: type=1326 audit(1689218651.746:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614919.904813] audit: type=1326 audit(1689218667.106:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344659 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614989.331061] audit: type=1326 audit(1689218736.530:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615026.778194] audit: type=1326 audit(1689218773.978:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615046.792010] audit: type=1326 audit(1689218793.989:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=353766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615075.957721] audit: type=1326 audit(1689218823.157:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=355648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615092.070251] audit: type=1326 audit(1689218839.269:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615105.006673] audit: type=1326 audit(1689218852.205:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615115.088959] audit: type=1326 audit(1689218862.289:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=374087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615140.436699] audit: type=1326 audit(1689218887.637:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=379563 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615189.321653] audit: type=1326 audit(1689218936.521:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=369018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615249.883397] audit: type=1326 audit(1689218997.081:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=377300 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615278.181181] audit: type=1326 audit(1689219025.381:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=365614 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615285.687507] audit: type=1326 audit(1689219032.885:854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383294 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615334.361923] audit: type=1326 audit(1689219081.561:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=386918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615358.021042] audit: type=1326 audit(1689219105.221:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=397046 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615372.830891] audit: type=1326 audit(1689219120.029:857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615392.629913] audit: type=1326 audit(1689219139.829:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=391869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615418.819110] audit: type=1326 audit(1689219166.017:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615534.998711] audit: type=1326 audit(1689219282.197:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615536.639688] audit: type=1326 audit(1689219283.837:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.252941] audit: type=1326 audit(1689219319.453:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.566380] audit: type=1326 audit(1689219319.765:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=402658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615607.239874] audit: type=1326 audit(1689219354.437:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=404197 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615682.174935] audit: type=1326 audit(1689219429.373:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=395486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615749.676438] audit: type=1326 audit(1689219496.873:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=409554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615772.856758] audit: type=1326 audit(1689219520.056:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=415966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615782.603424] audit: type=1326 audit(1689219529.800:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=393960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615837.996675] audit: type=1326 audit(1689219585.196:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414088 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.905148] audit: type=1326 audit(1689219603.108:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.959406] audit: type=1326 audit(1689219603.160:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414743 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615907.170690] audit: type=1326 audit(1689219654.372:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616016.968741] audit: type=1326 audit(1689219764.168:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419234 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616018.174727] audit: type=1326 audit(1689219765.376:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419205 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616049.790873] audit: type=1326 audit(1689219796.992:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420016 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616179.467941] audit: type=1326 audit(1689219926.668:876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616180.555813] audit: type=1326 audit(1689219927.756:877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616192.430465] audit: type=1326 audit(1689219939.632:878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616204.730256] audit: type=1326 audit(1689219951.932:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426323 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616215.467880] audit: type=1326 audit(1689219962.668:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426686 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616342.057416] audit: type=1326 audit(1689220089.260:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616344.197343] audit: type=1326 audit(1689220091.400:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427038 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616349.922513] audit: type=1326 audit(1689220097.124:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616463.003124] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117536ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.155216] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec1174f4ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.334664] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.365978] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.395492] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.434812] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.469559] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.499013] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.528098] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.559286] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.856088] audit: type=1326 audit(1689220211.056:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433896 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616468.036730] warn_bad_vsyscall: 56 callbacks suppressed [11616468.036733] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.143022] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.346868] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.476775] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.602391] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.747206] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.905526] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.069465] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.228264] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.373763] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616478.212932] audit: type=1326 audit(1689220225.412:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=399179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616486.892502] audit: type=1326 audit(1689220234.092:886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616504.636883] audit: type=1326 audit(1689220251.835:887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434647 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616506.387296] audit: type=1326 audit(1689220253.587:888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616618.325394] audit: type=1326 audit(1689220365.523:889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616624.272672] audit: type=1326 audit(1689220371.471:890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616641.156448] audit: type=1326 audit(1689220388.355:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616646.887273] audit: type=1326 audit(1689220394.087:892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416646 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616669.130945] audit: type=1326 audit(1689220416.331:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616671.357319] audit: type=1326 audit(1689220418.555:894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616685.822247] audit: type=1326 audit(1689220433.023:895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426318 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616727.733883] warn_bad_vsyscall: 14 callbacks suppressed [11616727.733887] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.854758] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.896011] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.024074] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.060517] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.174456] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.285948] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.286187] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.433658] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.542871] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.745666] warn_bad_vsyscall: 149 callbacks suppressed [11616732.745670] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.778992] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.807892] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.837387] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.866886] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.895047] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.005828] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.156311] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.302872] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.344866] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.937508] warn_bad_vsyscall: 156 callbacks suppressed [11616737.937511] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.978420] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.107496] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.221153] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.332316] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.371403] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.516981] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.646772] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.793750] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.925501] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616742.938460] warn_bad_vsyscall: 95 callbacks suppressed [11616742.938463] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.139113] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.249995] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.287426] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.799359] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.961896] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.123243] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.277308] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.579977] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.680400] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.059194] warn_bad_vsyscall: 179 callbacks suppressed [11616748.059198] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.099340] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.218641] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.353244] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.514493] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.675188] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.816625] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616748.957631] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.061746] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.178713] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.071882] warn_bad_vsyscall: 129 callbacks suppressed [11616753.071903] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.188917] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.305604] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.308145] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.434246] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.463792] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.573550] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.690786] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.948656] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616754.057794] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.088841] warn_bad_vsyscall: 69 callbacks suppressed [11616758.088845] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.198407] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.325846] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.452371] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.611864] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.848362] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.023674] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.223697] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.378129] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.414350] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.247975] warn_bad_vsyscall: 67 callbacks suppressed [11616763.247978] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.379531] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.506568] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.576974] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.712296] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.868809] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.012072] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.044986] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.075153] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.105612] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.632673] warn_bad_vsyscall: 72 callbacks suppressed [11616768.632677] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.764563] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.797201] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.945297] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.977094] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.105815] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.219603] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.319274] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.446879] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.586043] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.407661] warn_bad_vsyscall: 20 callbacks suppressed [11616774.407665] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.443917] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.480792] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.515412] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.549287] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.577325] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.615687] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.650789] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.680564] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.712742] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.732922] warn_bad_vsyscall: 59 callbacks suppressed [11616779.732927] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.873482] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.015511] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.144019] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.148245] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.292227] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.408584] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.554021] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.587092] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.707671] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616831.354738] audit: type=1326 audit(1689220578.555:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616849.536866] audit: type=1326 audit(1689220596.735:897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616891.400048] audit: type=1326 audit(1689220638.599:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616955.867342] audit: type=1326 audit(1689220703.067:899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616993.610115] audit: type=1326 audit(1689220740.811:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448725 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617027.425260] warn_bad_vsyscall: 1 callbacks suppressed [11617027.425263] exe[423335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559734aa5839 cs:33 sp:7f1166de5ee8 ax:0 si:20000240 di:ffffffffff600000 [11617031.423364] audit: type=1326 audit(1689220778.623:901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617034.068901] audit: type=1326 audit(1689220781.267:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=450336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617036.395177] exe[403877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2071a9839 cs:33 sp:7f1205849ee8 ax:0 si:20000240 di:ffffffffff600000 [11617110.112230] exe[450940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563710d72839 cs:33 sp:7fb6768c9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617120.897024] audit: type=1326 audit(1689220868.095:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=452760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617155.771686] audit: type=1326 audit(1689220902.971:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617163.858912] audit: type=1326 audit(1689220911.059:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=456904 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617173.909893] audit: type=1326 audit(1689220921.107:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=359483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617177.166434] audit: type=1326 audit(1689220924.363:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453803 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617199.530594] audit: type=1326 audit(1689220946.731:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458135 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617242.071168] exe[456653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d54535f839 cs:33 sp:7fddbdecbee8 ax:0 si:20000240 di:ffffffffff600000 [11617242.806185] exe[452415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7ccdb9839 cs:33 sp:7f37b6bf9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617285.999616] exe[453136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55772e5b8839 cs:33 sp:7ea5ab3feee8 ax:0 si:20000240 di:ffffffffff600000 [11617310.725595] exe[352485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564403af1839 cs:33 sp:7fe27b9feee8 ax:0 si:20000240 di:ffffffffff600000 [11617320.633665] audit: type=1326 audit(1689221067.830:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617333.963647] audit: type=1326 audit(1689221081.162:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617344.534053] exe[456677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6142f839 cs:33 sp:7fcfb7eebee8 ax:0 si:20000240 di:ffffffffff600000 [11617407.485335] audit: type=1326 audit(1689221154.682:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617407.510562] audit: type=1326 audit(1689221154.682:912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617450.603853] audit: type=1326 audit(1689221197.802:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444772 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617458.156564] exe[464010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55932fcf1839 cs:33 sp:7fadc19c2ee8 ax:0 si:20000240 di:ffffffffff600000 [11617470.363479] exe[373491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56224fbf2839 cs:33 sp:7f9f309ccee8 ax:0 si:20000240 di:ffffffffff600000 [11617473.971610] audit: type=1326 audit(1689221221.170:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617475.605465] exe[461182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796b1a858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.707828] exe[462051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.818558] exe[462052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617485.057212] audit: type=1326 audit(1689221232.254:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617570.056481] audit: type=1326 audit(1689221317.254:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=465697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617597.277555] audit: type=1326 audit(1689221344.474:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617616.134916] exe[368535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b36f85f839 cs:33 sp:7ecb96446ee8 ax:0 si:20000240 di:ffffffffff600000 [11617648.439900] audit: type=1326 audit(1689221395.638:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=467841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617678.970527] audit: type=1326 audit(1689221426.166:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=457982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617700.643689] audit: type=1326 audit(1689221447.842:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617732.017925] audit: type=1326 audit(1689221479.214:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469314 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617738.589958] audit: type=1326 audit(1689221485.786:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466971 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617740.351068] audit: type=1326 audit(1689221487.550:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617792.775079] exe[470535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93a6ea839 cs:33 sp:7ea8e19feee8 ax:0 si:20000240 di:ffffffffff600000 [11617809.463896] audit: type=1326 audit(1689221556.662:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470733 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617812.958637] exe[473479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578a49e9839 cs:33 sp:7f4af18abee8 ax:0 si:20000240 di:ffffffffff600000 [11617850.443757] audit: type=1326 audit(1689221597.642:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617882.299739] audit: type=1326 audit(1689221629.498:926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617893.147005] audit: type=1326 audit(1689221640.346:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=473353 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617934.186694] audit: type=1326 audit(1689221681.382:928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617983.641154] audit: type=1326 audit(1689221730.833:929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618007.754035] exe[479109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc7088839 cs:33 sp:7f115bb4aee8 ax:0 si:20000240 di:ffffffffff600000 [11618023.408403] exe[477266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.501534] exe[471958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.601684] exe[471707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618024.400520] audit: type=1326 audit(1689221771.597:930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=477359 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618074.174434] audit: type=1326 audit(1689221821.369:931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618146.086115] audit: type=1326 audit(1689221893.281:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=480365 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618165.619972] audit: type=1326 audit(1689221912.817:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.009828] audit: type=1326 audit(1689221982.205:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437493 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.035898] audit: type=1326 audit(1689221982.233:935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=485075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618257.120281] audit: type=1326 audit(1689222004.317:936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618306.553982] audit: type=1326 audit(1689222053.749:937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618309.160749] audit: type=1326 audit(1689222056.357:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618328.009567] audit: type=1326 audit(1689222075.205:939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=491196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618396.215364] audit: type=1326 audit(1689222143.413:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618458.057109] audit: type=1326 audit(1689222205.253:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618471.167306] audit: type=1326 audit(1689222218.365:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493625 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618558.971085] audit: type=1326 audit(1689222306.165:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=498306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618599.005616] audit: type=1326 audit(1689222346.201:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500998 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618614.605767] audit: type=1326 audit(1689222361.801:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471350 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618616.160870] audit: type=1326 audit(1689222363.357:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453695 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618632.621352] audit: type=1326 audit(1689222379.817:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=502952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618740.688253] audit: type=1326 audit(1689222487.888:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618794.782232] audit: type=1326 audit(1689222541.980:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=516208 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618828.244900] audit: type=1326 audit(1689222575.444:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442795 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618883.250327] audit: type=1326 audit(1689222630.448:951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=527662 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618905.654237] audit: type=1326 audit(1689222652.852:952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=539741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618955.994306] audit: type=1326 audit(1689222703.192:953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618991.070845] audit: type=1326 audit(1689222738.268:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618995.914657] exe[531498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae92ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.576485] exe[545055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.698654] exe[515605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618998.466088] audit: type=1326 audit(1689222745.664:955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545946 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619039.105891] audit: type=1326 audit(1689222786.304:956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=540251 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619081.481628] audit: type=1326 audit(1689222828.680:957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472579 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619132.788973] audit: type=1326 audit(1689222879.988:958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=546430 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619169.205197] audit: type=1326 audit(1689222916.404:959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552581 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619181.529368] audit: type=1326 audit(1689222928.728:960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=548478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619204.740432] audit: type=1326 audit(1689222951.940:961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=554938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619231.628546] audit: type=1326 audit(1689222978.828:962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619294.278304] audit: type=1326 audit(1689223041.476:963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619302.932977] audit: type=1326 audit(1689223050.132:964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=553420 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619324.619811] audit: type=1326 audit(1689223071.816:965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619336.253946] audit: type=1326 audit(1689223083.452:966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619398.879385] exe[536155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.939422] exe[516375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.982844] exe[535671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619453.791031] audit: type=1326 audit(1689223200.987:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619465.706772] audit: type=1326 audit(1689223212.903:968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550448 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619487.423938] exe[566400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563c4858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.482399] exe[562461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.528570] exe[563319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619585.499945] audit: type=1326 audit(1689223332.695:969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619596.902218] audit: type=1326 audit(1689223344.099:970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565827 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619607.979102] audit: type=1326 audit(1689223355.175:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619689.631929] audit: type=1326 audit(1689223436.827:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619831.695309] audit: type=1326 audit(1689223578.891:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575570 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619856.886854] audit: type=1326 audit(1689223604.083:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577025 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619974.006322] audit: type=1326 audit(1689223721.203:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579928 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620035.655078] audit: type=1326 audit(1689223782.851:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=581361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620114.896040] audit: type=1326 audit(1689223862.090:977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=547279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620115.147632] audit: type=1326 audit(1689223862.342:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620215.428928] exe[578382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.470748] exe[578378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.508820] exe[545514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620227.851853] audit: type=1326 audit(1689223975.046:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=588747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620256.627986] audit: type=1326 audit(1689224003.822:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=591341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620370.738511] audit: type=1326 audit(1689224117.934:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620399.160346] audit: type=1326 audit(1689224146.354:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596641 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620513.054444] audit: type=1326 audit(1689224260.250:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620514.934894] audit: type=1326 audit(1689224262.130:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=600527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620580.941265] audit: type=1326 audit(1689224328.134:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620643.919662] audit: type=1326 audit(1689224391.114:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620654.467678] audit: type=1326 audit(1689224401.662:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620678.185533] audit: type=1326 audit(1689224425.382:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620753.378385] audit: type=1326 audit(1689224500.574:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606613 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620775.839985] audit: type=1326 audit(1689224523.034:990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620787.380160] audit: type=1326 audit(1689224534.574:991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620878.192117] audit: type=1326 audit(1689224625.385:992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=593770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620910.511245] audit: type=1326 audit(1689224657.705:993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620929.852560] audit: type=1326 audit(1689224677.045:994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=611154 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620952.654833] audit: type=1326 audit(1689224699.849:995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=615888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620975.728228] exe[616067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.809466] exe[616334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.900989] exe[616113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11621052.917706] audit: type=1326 audit(1689224800.113:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614987 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621080.863296] audit: type=1326 audit(1689224828.057:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621086.905149] audit: type=1326 audit(1689224834.097:998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616503 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621093.759891] audit: type=1326 audit(1689224840.953:999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621116.237723] audit: type=1326 audit(1689224863.429:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620684 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621196.426285] audit: type=1326 audit(1689224943.621:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=619071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621228.541993] audit: type=1326 audit(1689224975.737:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621254.426277] audit: type=1326 audit(1689225001.621:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621296.541965] audit: type=1326 audit(1689225043.737:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621338.665441] audit: type=1326 audit(1689225085.857:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=624649 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621388.698603] audit: type=1326 audit(1689225135.893:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=626245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621531.083825] audit: type=1326 audit(1689225278.277:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621601.363569] audit: type=1326 audit(1689225348.560:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=629565 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621641.234574] audit: type=1326 audit(1689225388.432:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621743.423222] audit: type=1326 audit(1689225490.620:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621783.864792] audit: type=1326 audit(1689225531.060:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=638357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621809.898362] audit: type=1326 audit(1689225557.092:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11621826.174675] audit: type=1326 audit(1689225573.372:1013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621885.405910] audit: type=1326 audit(1689225632.600:1014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=645644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621926.533008] audit: type=1326 audit(1689225673.728:1015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621949.459338] audit: type=1326 audit(1689225696.656:1016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662571 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11621949.730129] audit: type=1326 audit(1689225696.924:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662605 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11622002.580862] audit: type=1326 audit(1689225749.776:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622027.131721] audit: type=1326 audit(1689225774.328:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622069.015849] audit: type=1326 audit(1689225816.212:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622089.768391] audit: type=1326 audit(1689225836.964:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=653611 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622168.625168] audit: type=1326 audit(1689225915.820:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622169.672061] audit: type=1326 audit(1689225916.868:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=676306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622191.522526] audit: type=1326 audit(1689225938.716:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682767 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622312.206917] audit: type=1326 audit(1689226059.399:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622325.849714] audit: type=1326 audit(1689226073.043:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=683978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000