ply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:05.412247 700059 usertrap_amd64.go:212] [ 596: 597] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.412283 700059 usertrap_amd64.go:122] [ 596: 597] Allocate a new trap: 0xc0015ac060 13 D0713 05:28:05.412298 700059 usertrap_amd64.go:225] [ 596: 597] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:05.412355 700059 task_signals.go:470] [ 596: 596] Notified of signal 23 D0713 05:28:05.412485 700059 task_signals.go:220] [ 596: 596] Signal 23: delivering to handler D0713 05:28:05.420514 700059 usertrap_amd64.go:212] [ 596: 596] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.420545 700059 usertrap_amd64.go:122] [ 596: 596] Allocate a new trap: 0xc0015ac060 14 D0713 05:28:05.420557 700059 usertrap_amd64.go:225] [ 596: 596] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:05.420617 700059 task_exit.go:204] [ 596: 596] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.420647 700059 task_exit.go:204] [ 596: 596] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.420669 700059 task_signals.go:204] [ 596: 599] Signal 596, PID: 599, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.420662 700059 task_signals.go:204] [ 596: 598] Signal 596, PID: 598, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.420681 700059 task_exit.go:204] [ 596: 599] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.420696 700059 task_exit.go:204] [ 596: 599] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.420707 700059 task_exit.go:204] [ 596: 599] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.420722 700059 task_signals.go:204] [ 596: 597] Signal 596, PID: 597, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.420735 700059 task_signals.go:204] [ 596: 600] Signal 596, PID: 600, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.420743 700059 task_exit.go:204] [ 596: 597] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.420751 700059 task_signals.go:204] [ 596: 601] Signal 596, PID: 601, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.420786 700059 task_exit.go:204] [ 596: 597] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.420794 700059 task_exit.go:204] [ 596: 597] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.420806 700059 task_exit.go:204] [ 596: 600] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.420812 700059 task_exit.go:204] [ 596: 600] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.420817 700059 task_exit.go:204] [ 596: 600] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.420824 700059 task_exit.go:204] [ 596: 598] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.420830 700059 task_exit.go:204] [ 596: 598] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.420834 700059 task_exit.go:204] [ 596: 598] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.420843 700059 task_exit.go:204] [ 596: 601] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.422314 700059 task_exit.go:204] [ 596: 601] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.422348 700059 task_exit.go:204] [ 596: 601] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.422365 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:05.422421 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.422462 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:05.422605 700059 task_exit.go:204] [ 596: 596] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.424632 700059 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.426147 700059 syscalls.go:262] [ 602: 602] Allocating stack with size of 8388608 bytes D0713 05:28:05.426244 700059 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.427304 700059 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.427349 700059 usertrap_amd64.go:106] [ 602: 602] Map a usertrap vma at 62000 D0713 05:28:05.427500 700059 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000686ab0 1 D0713 05:28:05.427538 700059 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:05.427971 700059 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.427992 700059 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000686ab0 2 D0713 05:28:05.428000 700059 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:05.428868 700059 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.428892 700059 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000686ab0 3 D0713 05:28:05.428911 700059 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:05.435308 700059 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.435337 700059 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000686ab0 4 D0713 05:28:05.435352 700059 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:05.436684 700059 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.436708 700059 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000686ab0 5 D0713 05:28:05.436720 700059 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:05.436786 700059 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.436794 700059 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000686ab0 6 D0713 05:28:05.436803 700059 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:05.437098 700059 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.437125 700059 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000686ab0 7 D0713 05:28:05.437138 700059 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:05.437346 700059 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.437377 700059 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc000686ab0 8 D0713 05:28:05.437392 700059 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:05.437747 700059 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.437769 700059 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc000686ab0 9 D0713 05:28:05.437781 700059 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:05.437873 700059 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.437907 700059 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000686ab0 10 D0713 05:28:05.437922 700059 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:05.438491 700059 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.438519 700059 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc000686ab0 11 D0713 05:28:05.438559 700059 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:05.438621 700059 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.438641 700059 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc000686ab0 12 D0713 05:28:05.438650 700059 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:05.438670 700059 task_signals.go:470] [ 602: 602] Notified of signal 23 D0713 05:28:05.438692 700059 task_signals.go:220] [ 602: 602] Signal 23: delivering to handler D0713 05:28:05.445630 700059 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.445659 700059 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000686ab0 13 D0713 05:28:05.445672 700059 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:05.449797 700059 task_signals.go:470] [ 602: 602] Notified of signal 23 D0713 05:28:05.449851 700059 task_signals.go:220] [ 602: 602] Signal 23: delivering to handler I0713 05:28:05.456198 700059 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0713 05:28:05.456280 700059 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.456293 700059 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc000686ab0 14 D0713 05:28:05.456303 700059 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:05.456459 700059 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.456501 700059 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.456548 700059 task_signals.go:204] [ 602: 603] Signal 602, PID: 603, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.456558 700059 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.456563 700059 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.456567 700059 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.456579 700059 task_signals.go:204] [ 602: 604] Signal 602, PID: 604, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.456586 700059 task_exit.go:204] [ 602: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.456591 700059 task_exit.go:204] [ 602: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.456594 700059 task_exit.go:204] [ 602: 604] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.456609 700059 task_signals.go:204] [ 602: 605] Signal 602, PID: 605, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.456616 700059 task_exit.go:204] [ 602: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.456620 700059 task_exit.go:204] [ 602: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.456626 700059 task_exit.go:204] [ 602: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.456636 700059 task_signals.go:204] [ 602: 606] Signal 602, PID: 606, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.456643 700059 task_exit.go:204] [ 602: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.457658 700059 task_exit.go:204] [ 602: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.457680 700059 task_exit.go:204] [ 602: 606] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.457691 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:05.457720 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.457727 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:05.457913 700059 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.458492 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.459900 700059 syscalls.go:262] [ 607: 607] Allocating stack with size of 8388608 bytes D0713 05:28:05.459979 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.461520 700059 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.461556 700059 usertrap_amd64.go:106] [ 607: 607] Map a usertrap vma at 61000 D0713 05:28:05.461667 700059 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001a40360 1 D0713 05:28:05.461696 700059 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:05.461958 700059 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.461974 700059 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001a40360 2 D0713 05:28:05.461984 700059 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:05.462962 700059 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.463002 700059 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001a40360 3 D0713 05:28:05.463020 700059 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:05.469560 700059 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.469601 700059 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001a40360 4 D0713 05:28:05.469616 700059 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:05.470697 700059 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.470729 700059 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001a40360 5 D0713 05:28:05.470745 700059 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:05.470785 700059 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.470792 700059 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001a40360 6 D0713 05:28:05.470799 700059 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:05.471098 700059 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.471124 700059 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001a40360 7 D0713 05:28:05.471139 700059 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:05.471348 700059 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.471431 700059 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc001a40360 8 D0713 05:28:05.471457 700059 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:05.471617 700059 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.471637 700059 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001a40360 9 D0713 05:28:05.471649 700059 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:05.471661 700059 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.471669 700059 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc001a40360 10 D0713 05:28:05.471677 700059 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:05.472162 700059 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.472185 700059 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc001a40360 11 D0713 05:28:05.472195 700059 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:05.472314 700059 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.472329 700059 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc001a40360 12 D0713 05:28:05.472339 700059 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:05.472360 700059 task_signals.go:470] [ 607: 607] Notified of signal 23 D0713 05:28:05.472393 700059 task_signals.go:220] [ 607: 607] Signal 23: delivering to handler D0713 05:28:05.479806 700059 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.479836 700059 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001a40360 13 D0713 05:28:05.479847 700059 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:05.482685 700059 task_signals.go:470] [ 607: 607] Notified of signal 23 D0713 05:28:05.482760 700059 task_signals.go:220] [ 607: 607] Signal 23: delivering to handler I0713 05:28:05.491016 700059 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0713 05:28:05.491137 700059 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.491159 700059 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc001a40360 14 D0713 05:28:05.491171 700059 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:05.491230 700059 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.491258 700059 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.491284 700059 task_signals.go:204] [ 607: 608] Signal 607, PID: 608, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.491284 700059 task_signals.go:204] [ 607: 611] Signal 607, PID: 611, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.491285 700059 task_signals.go:204] [ 607: 612] Signal 607, PID: 612, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.491314 700059 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.491341 700059 task_signals.go:204] [ 607: 610] Signal 607, PID: 610, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.491374 700059 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.491382 700059 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.491399 700059 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.491425 700059 task_signals.go:204] [ 607: 609] Signal 607, PID: 609, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.491440 700059 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.491446 700059 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.491458 700059 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.491468 700059 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.491473 700059 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.491483 700059 task_exit.go:204] [ 607: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.491505 700059 task_exit.go:204] [ 607: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.491510 700059 task_exit.go:204] [ 607: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.491521 700059 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.492763 700059 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.492789 700059 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.492811 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:05.492841 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.492851 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:05.492993 700059 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.494009 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.495498 700059 syscalls.go:262] [ 613: 613] Allocating stack with size of 8388608 bytes D0713 05:28:05.495600 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.497413 700059 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.497504 700059 usertrap_amd64.go:106] [ 613: 613] Map a usertrap vma at 66000 D0713 05:28:05.497654 700059 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001ac42a0 1 D0713 05:28:05.497690 700059 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:05.498196 700059 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.498216 700059 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001ac42a0 2 D0713 05:28:05.498226 700059 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:05.498976 700059 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.498997 700059 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001ac42a0 3 D0713 05:28:05.499006 700059 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:05.506993 700059 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.507032 700059 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001ac42a0 4 D0713 05:28:05.507049 700059 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:05.508425 700059 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.508453 700059 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001ac42a0 5 D0713 05:28:05.508469 700059 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:05.508523 700059 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.508535 700059 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001ac42a0 6 D0713 05:28:05.508545 700059 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:05.508839 700059 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.508864 700059 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001ac42a0 7 D0713 05:28:05.508875 700059 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:05.509103 700059 usertrap_amd64.go:212] [ 613: 614] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.509133 700059 usertrap_amd64.go:122] [ 613: 614] Allocate a new trap: 0xc001ac42a0 8 D0713 05:28:05.509149 700059 usertrap_amd64.go:225] [ 613: 614] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:05.509360 700059 usertrap_amd64.go:212] [ 613: 614] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.509518 700059 usertrap_amd64.go:122] [ 613: 614] Allocate a new trap: 0xc001ac42a0 9 D0713 05:28:05.509537 700059 usertrap_amd64.go:225] [ 613: 614] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:05.509570 700059 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.509587 700059 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001ac42a0 10 D0713 05:28:05.509596 700059 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:05.518749 700059 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.518836 700059 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001ac42a0 11 D0713 05:28:05.518886 700059 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:05.521885 700059 usertrap_amd64.go:212] [ 613: 614] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.521912 700059 usertrap_amd64.go:122] [ 613: 614] Allocate a new trap: 0xc001ac42a0 12 D0713 05:28:05.521928 700059 usertrap_amd64.go:225] [ 613: 614] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:05.521980 700059 usertrap_amd64.go:212] [ 613: 614] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.522006 700059 usertrap_amd64.go:122] [ 613: 614] Allocate a new trap: 0xc001ac42a0 13 D0713 05:28:05.522018 700059 usertrap_amd64.go:225] [ 613: 614] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:05.522071 700059 task_signals.go:470] [ 613: 613] Notified of signal 23 D0713 05:28:05.522127 700059 task_signals.go:220] [ 613: 613] Signal 23: delivering to handler D0713 05:28:05.532346 700059 task_signals.go:470] [ 613: 613] Notified of signal 23 D0713 05:28:05.532502 700059 task_signals.go:220] [ 613: 613] Signal 23: delivering to handler I0713 05:28:05.533343 700059 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0713 05:28:05.533435 700059 usertrap_amd64.go:212] [ 613: 613] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.533451 700059 usertrap_amd64.go:122] [ 613: 613] Allocate a new trap: 0xc001ac42a0 14 D0713 05:28:05.533461 700059 usertrap_amd64.go:225] [ 613: 613] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:05.533514 700059 task_exit.go:204] [ 613: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.533540 700059 task_exit.go:204] [ 613: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.533561 700059 task_signals.go:204] [ 613: 616] Signal 613, PID: 616, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.533579 700059 task_exit.go:204] [ 613: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.533567 700059 task_signals.go:204] [ 613: 615] Signal 613, PID: 615, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.533584 700059 task_exit.go:204] [ 613: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.533589 700059 task_exit.go:204] [ 613: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.533600 700059 task_exit.go:204] [ 613: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.533610 700059 task_signals.go:204] [ 613: 614] Signal 613, PID: 614, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.533619 700059 task_exit.go:204] [ 613: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.533645 700059 task_exit.go:204] [ 613: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.533656 700059 task_signals.go:204] [ 613: 617] Signal 613, PID: 617, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.533664 700059 task_exit.go:204] [ 613: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.533669 700059 task_exit.go:204] [ 613: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.533672 700059 task_exit.go:204] [ 613: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.533679 700059 task_exit.go:204] [ 613: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.535780 700059 task_exit.go:204] [ 613: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.535805 700059 task_exit.go:204] [ 613: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.535819 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:05.537207 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.537270 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:05.537276 700059 task_exit.go:204] [ 613: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.537857 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.539369 700059 syscalls.go:262] [ 618: 618] Allocating stack with size of 8388608 bytes D0713 05:28:05.539466 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.542185 700059 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.542240 700059 usertrap_amd64.go:106] [ 618: 618] Map a usertrap vma at 63000 D0713 05:28:05.542309 700059 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc000687230 1 D0713 05:28:05.542347 700059 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:05.542825 700059 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.542838 700059 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc000687230 2 D0713 05:28:05.542851 700059 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:05.543458 700059 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.543489 700059 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc000687230 3 D0713 05:28:05.543501 700059 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:05.551699 700059 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.551728 700059 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc000687230 4 D0713 05:28:05.551742 700059 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:05.553047 700059 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.553073 700059 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc000687230 5 D0713 05:28:05.553091 700059 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:05.553148 700059 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.553157 700059 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc000687230 6 D0713 05:28:05.553169 700059 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:05.553353 700059 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.553371 700059 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc000687230 7 D0713 05:28:05.553380 700059 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:05.553564 700059 usertrap_amd64.go:212] [ 618: 619] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.553593 700059 usertrap_amd64.go:122] [ 618: 619] Allocate a new trap: 0xc000687230 8 D0713 05:28:05.553607 700059 usertrap_amd64.go:225] [ 618: 619] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:05.553901 700059 usertrap_amd64.go:212] [ 618: 619] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.553929 700059 usertrap_amd64.go:122] [ 618: 619] Allocate a new trap: 0xc000687230 9 D0713 05:28:05.553942 700059 usertrap_amd64.go:225] [ 618: 619] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:05.554198 700059 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.554217 700059 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc000687230 10 D0713 05:28:05.554225 700059 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:05.562807 700059 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.562853 700059 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc000687230 11 D0713 05:28:05.562868 700059 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:05.565689 700059 usertrap_amd64.go:212] [ 618: 619] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.565719 700059 usertrap_amd64.go:122] [ 618: 619] Allocate a new trap: 0xc000687230 12 D0713 05:28:05.565743 700059 usertrap_amd64.go:225] [ 618: 619] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:05.565796 700059 usertrap_amd64.go:212] [ 618: 619] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.565830 700059 usertrap_amd64.go:122] [ 618: 619] Allocate a new trap: 0xc000687230 13 D0713 05:28:05.565841 700059 usertrap_amd64.go:225] [ 618: 619] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:05.565879 700059 task_signals.go:470] [ 618: 618] Notified of signal 23 D0713 05:28:05.580089 700059 task_signals.go:220] [ 618: 618] Signal 23: delivering to handler D0713 05:28:05.597159 700059 task_signals.go:470] [ 618: 618] Notified of signal 23 D0713 05:28:05.597242 700059 task_signals.go:220] [ 618: 618] Signal 23: delivering to handler I0713 05:28:05.597640 700059 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0713 05:28:05.597790 700059 usertrap_amd64.go:212] [ 618: 618] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.597804 700059 usertrap_amd64.go:122] [ 618: 618] Allocate a new trap: 0xc000687230 14 D0713 05:28:05.597815 700059 usertrap_amd64.go:225] [ 618: 618] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:05.597879 700059 task_exit.go:204] [ 618: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.597898 700059 task_exit.go:204] [ 618: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.597920 700059 task_signals.go:204] [ 618: 619] Signal 618, PID: 619, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.597933 700059 task_exit.go:204] [ 618: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.597940 700059 task_exit.go:204] [ 618: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.597944 700059 task_exit.go:204] [ 618: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.597959 700059 task_signals.go:204] [ 618: 620] Signal 618, PID: 620, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.597967 700059 task_exit.go:204] [ 618: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.597974 700059 task_exit.go:204] [ 618: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.597979 700059 task_exit.go:204] [ 618: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.597989 700059 task_signals.go:204] [ 618: 621] Signal 618, PID: 621, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.597997 700059 task_exit.go:204] [ 618: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.598002 700059 task_exit.go:204] [ 618: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.598006 700059 task_exit.go:204] [ 618: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.597998 700059 task_signals.go:204] [ 618: 622] Signal 618, PID: 622, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.598027 700059 task_exit.go:204] [ 618: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.599224 700059 task_exit.go:204] [ 618: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.599241 700059 task_exit.go:204] [ 618: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.599252 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:05.602876 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.602896 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:05.603112 700059 task_exit.go:204] [ 618: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.610663 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.611934 700059 syscalls.go:262] [ 623: 623] Allocating stack with size of 8388608 bytes D0713 05:28:05.612031 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.624079 700059 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.624116 700059 usertrap_amd64.go:106] [ 623: 623] Map a usertrap vma at 66000 D0713 05:28:05.624172 700059 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001568ae0 1 D0713 05:28:05.624195 700059 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:05.624589 700059 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.624599 700059 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001568ae0 2 D0713 05:28:05.624608 700059 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:05.625271 700059 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.625284 700059 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001568ae0 3 D0713 05:28:05.625294 700059 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:05.631854 700059 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.631883 700059 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001568ae0 4 D0713 05:28:05.631895 700059 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:05.633179 700059 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.633191 700059 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001568ae0 5 D0713 05:28:05.633204 700059 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:05.633382 700059 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.633388 700059 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001568ae0 6 D0713 05:28:05.633393 700059 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:05.639387 700059 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.639397 700059 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001568ae0 7 D0713 05:28:05.639408 700059 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:05.639642 700059 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.639650 700059 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc001568ae0 8 D0713 05:28:05.639657 700059 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:05.639803 700059 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.639810 700059 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001568ae0 9 D0713 05:28:05.639820 700059 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:05.639837 700059 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.639842 700059 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc001568ae0 10 D0713 05:28:05.639848 700059 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:05.651328 700059 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.651359 700059 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc001568ae0 11 D0713 05:28:05.651372 700059 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:05.651454 700059 usertrap_amd64.go:212] [ 623: 624] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.651474 700059 usertrap_amd64.go:122] [ 623: 624] Allocate a new trap: 0xc001568ae0 12 D0713 05:28:05.651486 700059 usertrap_amd64.go:225] [ 623: 624] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:05.651525 700059 task_signals.go:470] [ 623: 623] Notified of signal 23 D0713 05:28:05.651564 700059 task_signals.go:220] [ 623: 623] Signal 23: delivering to handler D0713 05:28:05.672107 700059 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.672133 700059 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001568ae0 13 D0713 05:28:05.672144 700059 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) I0713 05:28:05.684057 700059 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0713 05:28:05.684183 700059 usertrap_amd64.go:212] [ 623: 623] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.684200 700059 usertrap_amd64.go:122] [ 623: 623] Allocate a new trap: 0xc001568ae0 14 D0713 05:28:05.684211 700059 usertrap_amd64.go:225] [ 623: 623] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:05.684332 700059 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.684372 700059 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.684409 700059 task_signals.go:204] [ 623: 624] Signal 623, PID: 624, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.684433 700059 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.684443 700059 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.684449 700059 task_exit.go:204] [ 623: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.684483 700059 task_signals.go:204] [ 623: 625] Signal 623, PID: 625, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.684495 700059 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.684504 700059 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.684510 700059 task_exit.go:204] [ 623: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.684525 700059 task_signals.go:204] [ 623: 626] Signal 623, PID: 626, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.684536 700059 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.685804 700059 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.685831 700059 task_exit.go:204] [ 623: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.685851 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:05.689829 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.689845 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:05.689974 700059 task_exit.go:204] [ 623: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.690531 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.691773 700059 syscalls.go:262] [ 627: 627] Allocating stack with size of 8388608 bytes D0713 05:28:05.691848 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.710285 700059 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.710318 700059 usertrap_amd64.go:106] [ 627: 627] Map a usertrap vma at 61000 D0713 05:28:05.710393 700059 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000756ae0 1 D0713 05:28:05.710439 700059 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:05.710597 700059 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.710615 700059 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000756ae0 2 D0713 05:28:05.710624 700059 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:05.711103 700059 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.711117 700059 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000756ae0 3 D0713 05:28:05.711126 700059 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:05.716160 700059 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.716200 700059 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000756ae0 4 D0713 05:28:05.716231 700059 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:05.723688 700059 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.723705 700059 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000756ae0 5 D0713 05:28:05.723718 700059 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:05.723888 700059 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.723913 700059 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000756ae0 6 D0713 05:28:05.723923 700059 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:05.724194 700059 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.724225 700059 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000756ae0 7 D0713 05:28:05.724234 700059 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:05.724439 700059 usertrap_amd64.go:212] [ 627: 629] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.724455 700059 usertrap_amd64.go:122] [ 627: 629] Allocate a new trap: 0xc000756ae0 8 D0713 05:28:05.724466 700059 usertrap_amd64.go:225] [ 627: 629] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:05.724488 700059 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.724498 700059 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000756ae0 9 D0713 05:28:05.724508 700059 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:05.724830 700059 usertrap_amd64.go:212] [ 627: 628] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.724928 700059 usertrap_amd64.go:122] [ 627: 628] Allocate a new trap: 0xc000756ae0 10 D0713 05:28:05.724994 700059 usertrap_amd64.go:225] [ 627: 628] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:05.731188 700059 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.731204 700059 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000756ae0 11 D0713 05:28:05.731215 700059 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:05.739200 700059 usertrap_amd64.go:212] [ 627: 628] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.739221 700059 usertrap_amd64.go:122] [ 627: 628] Allocate a new trap: 0xc000756ae0 12 D0713 05:28:05.739233 700059 usertrap_amd64.go:225] [ 627: 628] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:05.739346 700059 usertrap_amd64.go:212] [ 627: 628] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.739355 700059 usertrap_amd64.go:122] [ 627: 628] Allocate a new trap: 0xc000756ae0 13 D0713 05:28:05.739364 700059 usertrap_amd64.go:225] [ 627: 628] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:05.739398 700059 task_signals.go:470] [ 627: 627] Notified of signal 23 D0713 05:28:05.739484 700059 task_signals.go:220] [ 627: 627] Signal 23: delivering to handler I0713 05:28:05.747167 700059 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0713 05:28:05.747259 700059 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.747277 700059 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000756ae0 14 D0713 05:28:05.747296 700059 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:05.747393 700059 task_exit.go:204] [ 627: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.747433 700059 task_exit.go:204] [ 627: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.747470 700059 task_signals.go:204] [ 627: 629] Signal 627, PID: 629, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.747482 700059 task_exit.go:204] [ 627: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.747488 700059 task_exit.go:204] [ 627: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.747492 700059 task_exit.go:204] [ 627: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.747512 700059 task_signals.go:204] [ 627: 630] Signal 627, PID: 630, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.747520 700059 task_exit.go:204] [ 627: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.747524 700059 task_exit.go:204] [ 627: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.747528 700059 task_exit.go:204] [ 627: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.747539 700059 task_signals.go:204] [ 627: 631] Signal 627, PID: 631, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.747547 700059 task_exit.go:204] [ 627: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.747552 700059 task_exit.go:204] [ 627: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.747556 700059 task_exit.go:204] [ 627: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.747555 700059 task_signals.go:204] [ 627: 628] Signal 627, PID: 628, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.747583 700059 task_exit.go:204] [ 627: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.748710 700059 task_exit.go:204] [ 627: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.748723 700059 task_exit.go:204] [ 627: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.748735 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:05.748770 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.748778 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:05.749581 700059 task_exit.go:204] [ 627: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.749982 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.751103 700059 syscalls.go:262] [ 632: 632] Allocating stack with size of 8388608 bytes D0713 05:28:05.751175 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.752233 700059 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.752253 700059 usertrap_amd64.go:106] [ 632: 632] Map a usertrap vma at 6a000 D0713 05:28:05.752326 700059 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc0006879b0 1 D0713 05:28:05.752340 700059 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:05.752586 700059 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.752600 700059 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc0006879b0 2 D0713 05:28:05.752609 700059 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:05.753237 700059 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.753249 700059 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc0006879b0 3 D0713 05:28:05.753259 700059 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:05.766838 700059 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.766945 700059 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc0006879b0 4 D0713 05:28:05.766967 700059 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:05.771729 700059 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.771756 700059 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc0006879b0 5 D0713 05:28:05.771770 700059 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:05.771809 700059 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.771818 700059 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc0006879b0 6 D0713 05:28:05.771826 700059 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:05.772097 700059 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.772116 700059 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc0006879b0 7 D0713 05:28:05.772128 700059 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:05.772628 700059 usertrap_amd64.go:212] [ 632: 634] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.772648 700059 usertrap_amd64.go:122] [ 632: 634] Allocate a new trap: 0xc0006879b0 8 D0713 05:28:05.772661 700059 usertrap_amd64.go:225] [ 632: 634] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:05.772760 700059 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.772786 700059 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc0006879b0 9 D0713 05:28:05.772795 700059 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:05.773187 700059 usertrap_amd64.go:212] [ 632: 633] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.773203 700059 usertrap_amd64.go:122] [ 632: 633] Allocate a new trap: 0xc0006879b0 10 D0713 05:28:05.773211 700059 usertrap_amd64.go:225] [ 632: 633] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:05.778537 700059 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.778557 700059 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc0006879b0 11 D0713 05:28:05.778564 700059 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:05.785033 700059 usertrap_amd64.go:212] [ 632: 633] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.785050 700059 usertrap_amd64.go:122] [ 632: 633] Allocate a new trap: 0xc0006879b0 12 D0713 05:28:05.785061 700059 usertrap_amd64.go:225] [ 632: 633] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:05.785087 700059 usertrap_amd64.go:212] [ 632: 633] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.785104 700059 usertrap_amd64.go:122] [ 632: 633] Allocate a new trap: 0xc0006879b0 13 D0713 05:28:05.785124 700059 usertrap_amd64.go:225] [ 632: 633] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:05.785167 700059 task_signals.go:470] [ 632: 632] Notified of signal 23 D0713 05:28:05.785247 700059 task_signals.go:220] [ 632: 632] Signal 23: delivering to handler D0713 05:28:05.789789 700059 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.789811 700059 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc0006879b0 14 D0713 05:28:05.789821 700059 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:05.790491 700059 task_exit.go:204] [ 632: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.790513 700059 task_exit.go:204] [ 632: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.790530 700059 task_signals.go:204] [ 632: 633] Signal 632, PID: 633, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.790542 700059 task_exit.go:204] [ 632: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.790547 700059 task_exit.go:204] [ 632: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.790550 700059 task_exit.go:204] [ 632: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.790567 700059 task_signals.go:204] [ 632: 634] Signal 632, PID: 634, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.790574 700059 task_exit.go:204] [ 632: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.790579 700059 task_exit.go:204] [ 632: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.790584 700059 task_exit.go:204] [ 632: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.790592 700059 task_signals.go:204] [ 632: 635] Signal 632, PID: 635, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.790599 700059 task_exit.go:204] [ 632: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.790603 700059 task_exit.go:204] [ 632: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.790607 700059 task_exit.go:204] [ 632: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.790615 700059 task_signals.go:204] [ 632: 636] Signal 632, PID: 636, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.790622 700059 task_exit.go:204] [ 632: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.791583 700059 task_exit.go:204] [ 632: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.791613 700059 task_exit.go:204] [ 632: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.791626 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:05.791681 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.791705 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:05.791861 700059 task_exit.go:204] [ 632: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.792613 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.794121 700059 syscalls.go:262] [ 637: 637] Allocating stack with size of 8388608 bytes D0713 05:28:05.794190 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.795789 700059 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.795846 700059 usertrap_amd64.go:106] [ 637: 637] Map a usertrap vma at 62000 D0713 05:28:05.795904 700059 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc0007574a0 1 D0713 05:28:05.795927 700059 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:05.796559 700059 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.796578 700059 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc0007574a0 2 D0713 05:28:05.796587 700059 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:05.797056 700059 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.797069 700059 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc0007574a0 3 D0713 05:28:05.797076 700059 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:05.818936 700059 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.818991 700059 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc0007574a0 4 D0713 05:28:05.819007 700059 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:05.826643 700059 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.826744 700059 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc0007574a0 5 D0713 05:28:05.826767 700059 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:05.826873 700059 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.826933 700059 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc0007574a0 6 D0713 05:28:05.826949 700059 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:05.827192 700059 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.827254 700059 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc0007574a0 7 D0713 05:28:05.827273 700059 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:05.827806 700059 usertrap_amd64.go:212] [ 637: 638] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.827872 700059 usertrap_amd64.go:122] [ 637: 638] Allocate a new trap: 0xc0007574a0 8 D0713 05:28:05.828068 700059 usertrap_amd64.go:225] [ 637: 638] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:05.828183 700059 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.828217 700059 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc0007574a0 9 D0713 05:28:05.828340 700059 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:05.828413 700059 usertrap_amd64.go:212] [ 637: 638] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.829254 700059 usertrap_amd64.go:122] [ 637: 638] Allocate a new trap: 0xc0007574a0 10 D0713 05:28:05.835947 700059 usertrap_amd64.go:225] [ 637: 638] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:05.839859 700059 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.839883 700059 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc0007574a0 11 D0713 05:28:05.839892 700059 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:05.846688 700059 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:05.846746 700059 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc0007574a0 12 D0713 05:28:05.846763 700059 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 46b6e0 trap addr 623c0 ([184 24 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:05.846997 700059 usertrap_amd64.go:212] [ 637: 638] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.847060 700059 usertrap_amd64.go:122] [ 637: 638] Allocate a new trap: 0xc0007574a0 13 D0713 05:28:05.847103 700059 usertrap_amd64.go:225] [ 637: 638] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:05.847602 700059 usertrap_amd64.go:212] [ 637: 638] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.847661 700059 usertrap_amd64.go:122] [ 637: 638] Allocate a new trap: 0xc0007574a0 14 D0713 05:28:05.847712 700059 usertrap_amd64.go:225] [ 637: 638] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:05.847791 700059 task_signals.go:470] [ 637: 637] Notified of signal 23 D0713 05:28:05.847900 700059 task_signals.go:220] [ 637: 637] Signal 23: delivering to handler I0713 05:28:05.850744 700059 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0713 05:28:05.850883 700059 usertrap_amd64.go:212] [ 637: 637] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.850894 700059 usertrap_amd64.go:122] [ 637: 637] Allocate a new trap: 0xc0007574a0 15 D0713 05:28:05.850902 700059 usertrap_amd64.go:225] [ 637: 637] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 05:28:05.850999 700059 task_exit.go:204] [ 637: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.851066 700059 task_exit.go:204] [ 637: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.851101 700059 task_signals.go:204] [ 637: 639] Signal 637, PID: 639, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.851162 700059 task_exit.go:204] [ 637: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.851192 700059 task_exit.go:204] [ 637: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.851211 700059 task_exit.go:204] [ 637: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.851249 700059 task_signals.go:204] [ 637: 638] Signal 637, PID: 638, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.851273 700059 task_exit.go:204] [ 637: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.851283 700059 task_exit.go:204] [ 637: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.851288 700059 task_exit.go:204] [ 637: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.851312 700059 task_signals.go:204] [ 637: 640] Signal 637, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.851330 700059 task_exit.go:204] [ 637: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.851337 700059 task_exit.go:204] [ 637: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.851342 700059 task_exit.go:204] [ 637: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.851352 700059 task_signals.go:204] [ 637: 641] Signal 637, PID: 641, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.851369 700059 task_exit.go:204] [ 637: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.852132 700059 task_exit.go:204] [ 637: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.852160 700059 task_exit.go:204] [ 637: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.852173 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:05.855286 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.855307 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:05.855585 700059 task_exit.go:204] [ 637: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.855964 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.857207 700059 syscalls.go:262] [ 642: 642] Allocating stack with size of 8388608 bytes D0713 05:28:05.857337 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.858118 700059 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.858147 700059 usertrap_amd64.go:106] [ 642: 642] Map a usertrap vma at 66000 D0713 05:28:05.858205 700059 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc000757a70 1 D0713 05:28:05.858222 700059 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:05.859043 700059 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.859092 700059 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc000757a70 2 D0713 05:28:05.859122 700059 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:05.859894 700059 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.859941 700059 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc000757a70 3 D0713 05:28:05.859961 700059 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:05.865231 700059 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.865350 700059 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc000757a70 4 D0713 05:28:05.865393 700059 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:05.866917 700059 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.867012 700059 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc000757a70 5 D0713 05:28:05.867037 700059 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:05.867364 700059 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.867414 700059 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc000757a70 6 D0713 05:28:05.867446 700059 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:05.868098 700059 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.868124 700059 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc000757a70 7 D0713 05:28:05.868135 700059 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:05.868629 700059 usertrap_amd64.go:212] [ 642: 644] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.868645 700059 usertrap_amd64.go:122] [ 642: 644] Allocate a new trap: 0xc000757a70 8 D0713 05:28:05.868657 700059 usertrap_amd64.go:225] [ 642: 644] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:05.868743 700059 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.868752 700059 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc000757a70 9 D0713 05:28:05.868761 700059 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:05.869092 700059 usertrap_amd64.go:212] [ 642: 643] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.869106 700059 usertrap_amd64.go:122] [ 642: 643] Allocate a new trap: 0xc000757a70 10 D0713 05:28:05.869117 700059 usertrap_amd64.go:225] [ 642: 643] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:05.885096 700059 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.885122 700059 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc000757a70 11 D0713 05:28:05.885131 700059 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:05.885874 700059 usertrap_amd64.go:212] [ 642: 643] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.885885 700059 usertrap_amd64.go:122] [ 642: 643] Allocate a new trap: 0xc000757a70 12 D0713 05:28:05.885892 700059 usertrap_amd64.go:225] [ 642: 643] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:05.885914 700059 usertrap_amd64.go:212] [ 642: 643] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.885918 700059 usertrap_amd64.go:122] [ 642: 643] Allocate a new trap: 0xc000757a70 13 D0713 05:28:05.885924 700059 usertrap_amd64.go:225] [ 642: 643] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:05.885934 700059 task_signals.go:470] [ 642: 642] Notified of signal 23 D0713 05:28:05.885985 700059 task_signals.go:220] [ 642: 642] Signal 23: delivering to handler D0713 05:28:05.898891 700059 task_signals.go:470] [ 642: 642] Notified of signal 23 D0713 05:28:05.899059 700059 task_signals.go:220] [ 642: 642] Signal 23: delivering to handler I0713 05:28:05.899511 700059 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0713 05:28:05.899684 700059 usertrap_amd64.go:212] [ 642: 642] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.899708 700059 usertrap_amd64.go:122] [ 642: 642] Allocate a new trap: 0xc000757a70 14 D0713 05:28:05.899728 700059 usertrap_amd64.go:225] [ 642: 642] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:05.899895 700059 task_exit.go:204] [ 642: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.899947 700059 task_exit.go:204] [ 642: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.899982 700059 task_signals.go:204] [ 642: 645] Signal 642, PID: 645, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.900011 700059 task_exit.go:204] [ 642: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.900012 700059 task_signals.go:204] [ 642: 643] Signal 642, PID: 643, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.900023 700059 task_exit.go:204] [ 642: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.900044 700059 task_exit.go:204] [ 642: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.899977 700059 task_signals.go:204] [ 642: 644] Signal 642, PID: 644, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.900095 700059 task_signals.go:204] [ 642: 646] Signal 642, PID: 646, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.900106 700059 task_exit.go:204] [ 642: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.900151 700059 task_exit.go:204] [ 642: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.900178 700059 task_exit.go:204] [ 642: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.900201 700059 task_exit.go:204] [ 642: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.900226 700059 task_exit.go:204] [ 642: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.900251 700059 task_exit.go:204] [ 642: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.900272 700059 task_exit.go:204] [ 642: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.901553 700059 task_exit.go:204] [ 642: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.901597 700059 task_exit.go:204] [ 642: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.901615 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:05.907200 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.907283 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:05.907694 700059 task_exit.go:204] [ 642: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.908440 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.909939 700059 syscalls.go:262] [ 647: 647] Allocating stack with size of 8388608 bytes D0713 05:28:05.910619 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.913733 700059 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.913796 700059 usertrap_amd64.go:106] [ 647: 647] Map a usertrap vma at 67000 D0713 05:28:05.913939 700059 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0005aa2d0 1 D0713 05:28:05.913994 700059 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:05.915485 700059 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.915598 700059 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0005aa2d0 2 D0713 05:28:05.915634 700059 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:05.916897 700059 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.917278 700059 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0005aa2d0 3 D0713 05:28:05.917324 700059 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:05.923690 700059 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.923743 700059 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0005aa2d0 4 D0713 05:28:05.923764 700059 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:05.924827 700059 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.924919 700059 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0005aa2d0 5 D0713 05:28:05.925017 700059 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:05.925077 700059 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.925101 700059 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0005aa2d0 6 D0713 05:28:05.925113 700059 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:05.925491 700059 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.925589 700059 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0005aa2d0 7 D0713 05:28:05.925632 700059 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:05.925921 700059 usertrap_amd64.go:212] [ 647: 648] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.925994 700059 usertrap_amd64.go:122] [ 647: 648] Allocate a new trap: 0xc0005aa2d0 8 D0713 05:28:05.926051 700059 usertrap_amd64.go:225] [ 647: 648] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:05.926349 700059 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.926410 700059 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0005aa2d0 9 D0713 05:28:05.926434 700059 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:05.926479 700059 usertrap_amd64.go:212] [ 647: 648] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.926490 700059 usertrap_amd64.go:122] [ 647: 648] Allocate a new trap: 0xc0005aa2d0 10 D0713 05:28:05.926500 700059 usertrap_amd64.go:225] [ 647: 648] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:05.936419 700059 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.936548 700059 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0005aa2d0 11 D0713 05:28:05.936645 700059 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:05.937524 700059 usertrap_amd64.go:212] [ 647: 648] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.937576 700059 usertrap_amd64.go:122] [ 647: 648] Allocate a new trap: 0xc0005aa2d0 12 D0713 05:28:05.937597 700059 usertrap_amd64.go:225] [ 647: 648] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:05.937697 700059 usertrap_amd64.go:212] [ 647: 648] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.937720 700059 usertrap_amd64.go:122] [ 647: 648] Allocate a new trap: 0xc0005aa2d0 13 D0713 05:28:05.937731 700059 usertrap_amd64.go:225] [ 647: 648] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:05.937893 700059 task_signals.go:470] [ 647: 647] Notified of signal 23 D0713 05:28:05.939413 700059 task_signals.go:220] [ 647: 647] Signal 23: delivering to handler I0713 05:28:05.948480 700059 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0713 05:28:05.948561 700059 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.948577 700059 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc0005aa2d0 14 D0713 05:28:05.948593 700059 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:05.948668 700059 task_exit.go:204] [ 647: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.948698 700059 task_signals.go:204] [ 647: 648] Signal 647, PID: 648, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.948739 700059 task_signals.go:204] [ 647: 651] Signal 647, PID: 651, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.948757 700059 task_signals.go:204] [ 647: 650] Signal 647, PID: 650, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.948783 700059 task_exit.go:204] [ 647: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.948807 700059 task_signals.go:204] [ 647: 649] Signal 647, PID: 649, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.948819 700059 task_exit.go:204] [ 647: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.948829 700059 task_exit.go:204] [ 647: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.948835 700059 task_exit.go:204] [ 647: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.948849 700059 task_exit.go:204] [ 647: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.948857 700059 task_exit.go:204] [ 647: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.948862 700059 task_exit.go:204] [ 647: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.948872 700059 task_exit.go:204] [ 647: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.948881 700059 task_exit.go:204] [ 647: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.948886 700059 task_exit.go:204] [ 647: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.948896 700059 task_exit.go:204] [ 647: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.950037 700059 task_exit.go:204] [ 647: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.950083 700059 task_exit.go:204] [ 647: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.950100 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:05.950166 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.950193 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:05.950387 700059 task_exit.go:204] [ 647: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.950813 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.951306 700059 task_signals.go:481] [ 6: 20] No task notified of signal 23 D0713 05:28:05.952593 700059 syscalls.go:262] [ 652: 652] Allocating stack with size of 8388608 bytes D0713 05:28:05.952876 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.953010 700059 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 05:28:05.953059 700059 task_signals.go:470] [ 6: 20] Notified of signal 23 D0713 05:28:05.953088 700059 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 05:28:05.954353 700059 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.954381 700059 usertrap_amd64.go:106] [ 652: 652] Map a usertrap vma at 64000 D0713 05:28:05.954444 700059 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0018040c0 1 D0713 05:28:05.954469 700059 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:05.955498 700059 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.955527 700059 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0018040c0 2 D0713 05:28:05.955539 700059 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:05.956079 700059 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.956094 700059 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0018040c0 3 D0713 05:28:05.956103 700059 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:05.965678 700059 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:05.965722 700059 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0018040c0 4 D0713 05:28:05.965739 700059 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:05.967784 700059 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:05.967814 700059 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0018040c0 5 D0713 05:28:05.967824 700059 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:05.967890 700059 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b214:sysno 13 D0713 05:28:05.967937 700059 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0018040c0 6 D0713 05:28:05.967952 700059 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:05.968315 700059 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:05.968340 700059 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0018040c0 7 D0713 05:28:05.968350 700059 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:05.968578 700059 usertrap_amd64.go:212] [ 652: 653] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:05.968633 700059 usertrap_amd64.go:122] [ 652: 653] Allocate a new trap: 0xc0018040c0 8 D0713 05:28:05.968657 700059 usertrap_amd64.go:225] [ 652: 653] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:05.968892 700059 usertrap_amd64.go:212] [ 652: 653] Found the pattern at ip 46af76:sysno 35 D0713 05:28:05.968916 700059 usertrap_amd64.go:122] [ 652: 653] Allocate a new trap: 0xc0018040c0 9 D0713 05:28:05.968925 700059 usertrap_amd64.go:225] [ 652: 653] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:05.968986 700059 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:05.969016 700059 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0018040c0 10 D0713 05:28:05.969045 700059 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:05.977728 700059 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46af29:sysno 293 D0713 05:28:05.977760 700059 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0018040c0 11 D0713 05:28:05.977775 700059 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:05.979331 700059 usertrap_amd64.go:212] [ 652: 653] Found the pattern at ip 46b020:sysno 39 D0713 05:28:05.979355 700059 usertrap_amd64.go:122] [ 652: 653] Allocate a new trap: 0xc0018040c0 12 D0713 05:28:05.979367 700059 usertrap_amd64.go:225] [ 652: 653] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:05.981524 700059 usertrap_amd64.go:212] [ 652: 653] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:05.981635 700059 usertrap_amd64.go:122] [ 652: 653] Allocate a new trap: 0xc0018040c0 13 D0713 05:28:05.981765 700059 usertrap_amd64.go:225] [ 652: 653] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:05.982438 700059 task_signals.go:470] [ 652: 652] Notified of signal 23 D0713 05:28:05.982678 700059 task_signals.go:220] [ 652: 652] Signal 23: delivering to handler D0713 05:28:05.990838 700059 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:05.990867 700059 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0018040c0 14 D0713 05:28:05.990882 700059 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:05.990938 700059 task_exit.go:204] [ 652: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.991046 700059 task_exit.go:204] [ 652: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.991078 700059 task_signals.go:204] [ 652: 653] Signal 652, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.991111 700059 task_exit.go:204] [ 652: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.991123 700059 task_exit.go:204] [ 652: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.991129 700059 task_exit.go:204] [ 652: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.991144 700059 task_signals.go:204] [ 652: 655] Signal 652, PID: 655, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.991171 700059 task_exit.go:204] [ 652: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.991185 700059 task_signals.go:204] [ 652: 656] Signal 652, PID: 656, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.991196 700059 task_signals.go:204] [ 652: 654] Signal 652, PID: 654, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:05.991254 700059 task_exit.go:204] [ 652: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.991266 700059 task_exit.go:204] [ 652: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.991282 700059 task_exit.go:204] [ 652: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.991292 700059 task_exit.go:204] [ 652: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.991296 700059 task_exit.go:204] [ 652: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.991303 700059 task_exit.go:204] [ 652: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:05.992480 700059 task_exit.go:204] [ 652: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:05.992514 700059 task_exit.go:204] [ 652: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.992533 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:05.992567 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:05.992587 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:05.992720 700059 task_exit.go:204] [ 652: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:05.993453 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.995126 700059 syscalls.go:262] [ 657: 657] Allocating stack with size of 8388608 bytes D0713 05:28:05.995225 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:05.996321 700059 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:05.996364 700059 usertrap_amd64.go:106] [ 657: 657] Map a usertrap vma at 62000 D0713 05:28:05.996464 700059 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a41560 1 D0713 05:28:05.996500 700059 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:05.997005 700059 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:05.997037 700059 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a41560 2 D0713 05:28:05.997049 700059 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:05.997678 700059 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:05.997706 700059 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a41560 3 D0713 05:28:05.997720 700059 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:06.003220 700059 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.003304 700059 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a41560 4 D0713 05:28:06.003318 700059 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:06.004409 700059 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.004447 700059 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a41560 5 D0713 05:28:06.004461 700059 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:06.004514 700059 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.004526 700059 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a41560 6 D0713 05:28:06.004533 700059 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:06.004917 700059 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.004933 700059 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a41560 7 D0713 05:28:06.005004 700059 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:06.005217 700059 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.005242 700059 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc001a41560 8 D0713 05:28:06.005255 700059 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:06.005610 700059 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.005670 700059 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a41560 9 D0713 05:28:06.005748 700059 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:06.005801 700059 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.005810 700059 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc001a41560 10 D0713 05:28:06.005831 700059 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:06.013615 700059 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.013647 700059 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a41560 11 D0713 05:28:06.013660 700059 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:06.017103 700059 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.017174 700059 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc001a41560 12 D0713 05:28:06.017193 700059 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:06.017278 700059 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.017292 700059 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc001a41560 13 D0713 05:28:06.017305 700059 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:06.017443 700059 task_signals.go:470] [ 657: 657] Notified of signal 23 D0713 05:28:06.017563 700059 task_signals.go:220] [ 657: 657] Signal 23: delivering to handler D0713 05:28:06.023831 700059 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.023855 700059 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc001a41560 14 D0713 05:28:06.023869 700059 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:06.023904 700059 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.023929 700059 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.023955 700059 task_signals.go:204] [ 657: 660] Signal 657, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.023965 700059 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.023972 700059 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.023975 700059 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.023994 700059 task_signals.go:204] [ 657: 658] Signal 657, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.023969 700059 task_signals.go:204] [ 657: 659] Signal 657, PID: 659, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.023996 700059 task_signals.go:204] [ 657: 661] Signal 657, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.024002 700059 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.024022 700059 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.024061 700059 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.024067 700059 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.024082 700059 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.024092 700059 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.024097 700059 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.025192 700059 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.025227 700059 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.025251 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.025301 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.025325 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.025393 700059 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.026065 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.027537 700059 syscalls.go:262] [ 662: 662] Allocating stack with size of 8388608 bytes D0713 05:28:06.027616 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.028958 700059 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.029001 700059 usertrap_amd64.go:106] [ 662: 662] Map a usertrap vma at 69000 D0713 05:28:06.029084 700059 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc001a415f0 1 D0713 05:28:06.029123 700059 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:06.029666 700059 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.029690 700059 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc001a415f0 2 D0713 05:28:06.029702 700059 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:06.030283 700059 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.030310 700059 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc001a415f0 3 D0713 05:28:06.030319 700059 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:06.035780 700059 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.035810 700059 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc001a415f0 4 D0713 05:28:06.035822 700059 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:06.037007 700059 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.037036 700059 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc001a415f0 5 D0713 05:28:06.037049 700059 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:06.037100 700059 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.037111 700059 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc001a415f0 6 D0713 05:28:06.037117 700059 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:06.037305 700059 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.037324 700059 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc001a415f0 7 D0713 05:28:06.037334 700059 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:06.037433 700059 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.037455 700059 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc001a415f0 8 D0713 05:28:06.037469 700059 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:06.037640 700059 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.037665 700059 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc001a415f0 9 D0713 05:28:06.037677 700059 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:06.037702 700059 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.037709 700059 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc001a415f0 10 D0713 05:28:06.037718 700059 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:06.044522 700059 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.044552 700059 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc001a415f0 11 D0713 05:28:06.044564 700059 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:06.048213 700059 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.048243 700059 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc001a415f0 12 D0713 05:28:06.048256 700059 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:06.048274 700059 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.048282 700059 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc001a415f0 13 D0713 05:28:06.048294 700059 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:06.048315 700059 task_signals.go:470] [ 662: 662] Notified of signal 23 D0713 05:28:06.048358 700059 task_signals.go:220] [ 662: 662] Signal 23: delivering to handler D0713 05:28:06.053858 700059 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.053886 700059 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc001a415f0 14 D0713 05:28:06.053919 700059 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:06.053978 700059 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.054016 700059 task_signals.go:204] [ 662: 663] Signal 662, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.054023 700059 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.054016 700059 task_signals.go:204] [ 662: 665] Signal 662, PID: 665, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.054054 700059 task_signals.go:204] [ 662: 666] Signal 662, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.054091 700059 task_signals.go:204] [ 662: 664] Signal 662, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.054108 700059 task_exit.go:204] [ 662: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.054120 700059 task_exit.go:204] [ 662: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.054129 700059 task_exit.go:204] [ 662: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.054142 700059 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.054161 700059 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.054169 700059 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.054180 700059 task_exit.go:204] [ 662: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.054198 700059 task_exit.go:204] [ 662: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.054206 700059 task_exit.go:204] [ 662: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.054216 700059 task_exit.go:204] [ 662: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.055143 700059 task_exit.go:204] [ 662: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.055171 700059 task_exit.go:204] [ 662: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.055187 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.055215 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.055233 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.055368 700059 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.055887 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.057223 700059 syscalls.go:262] [ 667: 667] Allocating stack with size of 8388608 bytes D0713 05:28:06.057306 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.057782 700059 sampler.go:191] Time: Adjusting syscall overhead down to 588 D0713 05:28:06.058262 700059 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.058310 700059 usertrap_amd64.go:106] [ 667: 667] Map a usertrap vma at 66000 D0713 05:28:06.058530 700059 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001a41c20 1 D0713 05:28:06.058561 700059 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:06.058987 700059 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.059017 700059 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001a41c20 2 D0713 05:28:06.059026 700059 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:06.059590 700059 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.059611 700059 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001a41c20 3 D0713 05:28:06.059617 700059 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:06.065610 700059 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.065637 700059 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001a41c20 4 D0713 05:28:06.065648 700059 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:06.066783 700059 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.066817 700059 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001a41c20 5 D0713 05:28:06.066833 700059 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:06.066875 700059 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.066881 700059 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001a41c20 6 D0713 05:28:06.066887 700059 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:06.067111 700059 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.067187 700059 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001a41c20 7 D0713 05:28:06.067215 700059 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:06.067405 700059 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.067472 700059 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc001a41c20 8 D0713 05:28:06.067491 700059 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:06.067652 700059 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.067673 700059 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc001a41c20 9 D0713 05:28:06.067682 700059 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:06.067858 700059 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.067884 700059 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001a41c20 10 D0713 05:28:06.067894 700059 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:06.074857 700059 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.074883 700059 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001a41c20 11 D0713 05:28:06.074893 700059 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:06.078224 700059 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.078255 700059 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc001a41c20 12 D0713 05:28:06.078271 700059 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:06.078327 700059 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.078357 700059 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc001a41c20 13 D0713 05:28:06.078366 700059 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:06.078445 700059 task_signals.go:470] [ 667: 667] Notified of signal 23 D0713 05:28:06.078528 700059 task_signals.go:220] [ 667: 667] Signal 23: delivering to handler D0713 05:28:06.084917 700059 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.085008 700059 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc001a41c20 14 D0713 05:28:06.085028 700059 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:06.085059 700059 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.085091 700059 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.085093 700059 task_signals.go:204] [ 667: 670] Signal 667, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.085119 700059 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.085113 700059 task_signals.go:204] [ 667: 668] Signal 667, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.085132 700059 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.085122 700059 task_signals.go:204] [ 667: 671] Signal 667, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.085138 700059 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.085198 700059 task_signals.go:204] [ 667: 669] Signal 667, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.085214 700059 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.085309 700059 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.085321 700059 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.085334 700059 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.085342 700059 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.085349 700059 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.085359 700059 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.086411 700059 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.086442 700059 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.086456 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.086489 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.086498 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.086614 700059 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.087375 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.088756 700059 syscalls.go:262] [ 672: 672] Allocating stack with size of 8388608 bytes D0713 05:28:06.088870 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.089773 700059 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.089814 700059 usertrap_amd64.go:106] [ 672: 672] Map a usertrap vma at 69000 D0713 05:28:06.090146 700059 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001569230 1 D0713 05:28:06.090179 700059 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:06.090514 700059 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.090584 700059 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001569230 2 D0713 05:28:06.090610 700059 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:06.091380 700059 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.091417 700059 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001569230 3 D0713 05:28:06.091436 700059 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:06.097590 700059 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.097625 700059 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001569230 4 D0713 05:28:06.097640 700059 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:06.098841 700059 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.098870 700059 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001569230 5 D0713 05:28:06.098879 700059 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:06.098938 700059 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.098955 700059 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001569230 6 D0713 05:28:06.098962 700059 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:06.099211 700059 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.099220 700059 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001569230 7 D0713 05:28:06.099227 700059 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:06.099348 700059 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.099377 700059 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc001569230 8 D0713 05:28:06.099390 700059 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:06.099670 700059 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.099688 700059 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001569230 9 D0713 05:28:06.099699 700059 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:06.099711 700059 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.099717 700059 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc001569230 10 D0713 05:28:06.099726 700059 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:06.107555 700059 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.107580 700059 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001569230 11 D0713 05:28:06.107590 700059 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:06.111605 700059 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.111648 700059 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc001569230 12 D0713 05:28:06.111662 700059 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:06.111732 700059 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.111768 700059 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc001569230 13 D0713 05:28:06.111784 700059 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:06.111828 700059 task_signals.go:470] [ 672: 672] Notified of signal 23 D0713 05:28:06.111924 700059 task_signals.go:220] [ 672: 672] Signal 23: delivering to handler D0713 05:28:06.118544 700059 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.118591 700059 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc001569230 14 D0713 05:28:06.118602 700059 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:06.118655 700059 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.118691 700059 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.118719 700059 task_signals.go:204] [ 672: 675] Signal 672, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.118719 700059 task_signals.go:204] [ 672: 674] Signal 672, PID: 674, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.118741 700059 task_signals.go:204] [ 672: 676] Signal 672, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.118743 700059 task_exit.go:204] [ 672: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.118765 700059 task_signals.go:204] [ 672: 673] Signal 672, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.118803 700059 task_exit.go:204] [ 672: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.118811 700059 task_exit.go:204] [ 672: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.118825 700059 task_exit.go:204] [ 672: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.118834 700059 task_exit.go:204] [ 672: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.118841 700059 task_exit.go:204] [ 672: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.118851 700059 task_exit.go:204] [ 672: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.118863 700059 task_exit.go:204] [ 672: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.118883 700059 task_exit.go:204] [ 672: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.118891 700059 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.119889 700059 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.119934 700059 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.119948 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.119974 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.119985 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.120170 700059 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.120923 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.122412 700059 syscalls.go:262] [ 677: 677] Allocating stack with size of 8388608 bytes D0713 05:28:06.122534 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.124811 700059 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.124854 700059 usertrap_amd64.go:106] [ 677: 677] Map a usertrap vma at 61000 D0713 05:28:06.129036 700059 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001ac59e0 1 D0713 05:28:06.129077 700059 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:06.129529 700059 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.129550 700059 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001ac59e0 2 D0713 05:28:06.129562 700059 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:06.130208 700059 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.130232 700059 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001ac59e0 3 D0713 05:28:06.130247 700059 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:06.136214 700059 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.136242 700059 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001ac59e0 4 D0713 05:28:06.136251 700059 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:06.137438 700059 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.137493 700059 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001ac59e0 5 D0713 05:28:06.137506 700059 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:06.137550 700059 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.137567 700059 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001ac59e0 6 D0713 05:28:06.137575 700059 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:06.137790 700059 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.137809 700059 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001ac59e0 7 D0713 05:28:06.137817 700059 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:06.137970 700059 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.137994 700059 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc001ac59e0 8 D0713 05:28:06.138008 700059 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:06.138212 700059 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.138242 700059 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc001ac59e0 9 D0713 05:28:06.138259 700059 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:06.138281 700059 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.138289 700059 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001ac59e0 10 D0713 05:28:06.138297 700059 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:06.145394 700059 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.145427 700059 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001ac59e0 11 D0713 05:28:06.145443 700059 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:06.149453 700059 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.149486 700059 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc001ac59e0 12 D0713 05:28:06.149500 700059 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:06.149544 700059 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.149552 700059 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc001ac59e0 13 D0713 05:28:06.149561 700059 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:06.149581 700059 task_signals.go:470] [ 677: 677] Notified of signal 23 D0713 05:28:06.149899 700059 task_signals.go:220] [ 677: 677] Signal 23: delivering to handler D0713 05:28:06.155810 700059 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.155854 700059 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001ac59e0 14 D0713 05:28:06.155872 700059 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:06.155985 700059 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.156011 700059 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.156077 700059 task_signals.go:204] [ 677: 678] Signal 677, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.156115 700059 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.156089 700059 task_signals.go:204] [ 677: 681] Signal 677, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.156093 700059 task_signals.go:204] [ 677: 680] Signal 677, PID: 680, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.156108 700059 task_signals.go:204] [ 677: 679] Signal 677, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.156135 700059 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.156156 700059 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.156187 700059 task_signals.go:204] [ 677: 682] Signal 677, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.156196 700059 task_exit.go:204] [ 677: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.156213 700059 task_exit.go:204] [ 677: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.156219 700059 task_exit.go:204] [ 677: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.156233 700059 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.156259 700059 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.156266 700059 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.156281 700059 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.156290 700059 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.156296 700059 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.156307 700059 task_exit.go:204] [ 677: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.157403 700059 task_exit.go:204] [ 677: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.157433 700059 task_exit.go:204] [ 677: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.157455 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.157486 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.157495 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.157577 700059 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.158337 700059 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.159705 700059 syscalls.go:262] [ 683: 683] Allocating stack with size of 8388608 bytes D0713 05:28:06.159812 700059 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.161333 700059 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.161370 700059 usertrap_amd64.go:106] [ 683: 683] Map a usertrap vma at 63000 D0713 05:28:06.161512 700059 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0015695c0 1 D0713 05:28:06.161603 700059 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:06.161909 700059 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.161936 700059 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0015695c0 2 D0713 05:28:06.161947 700059 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:06.162938 700059 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.162963 700059 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0015695c0 3 D0713 05:28:06.162972 700059 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:06.169384 700059 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.169410 700059 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0015695c0 4 D0713 05:28:06.169422 700059 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:06.170499 700059 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.170530 700059 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0015695c0 5 D0713 05:28:06.170541 700059 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:06.170591 700059 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.170603 700059 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0015695c0 6 D0713 05:28:06.170612 700059 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:06.170845 700059 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.170872 700059 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0015695c0 7 D0713 05:28:06.170881 700059 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:06.171031 700059 usertrap_amd64.go:212] [ 683: 684] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.171071 700059 usertrap_amd64.go:122] [ 683: 684] Allocate a new trap: 0xc0015695c0 8 D0713 05:28:06.171083 700059 usertrap_amd64.go:225] [ 683: 684] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:06.171633 700059 usertrap_amd64.go:212] [ 683: 684] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:06.171657 700059 usertrap_amd64.go:122] [ 683: 684] Allocate a new trap: 0xc0015695c0 9 D0713 05:28:06.171666 700059 usertrap_amd64.go:225] [ 683: 684] Apply the binary patch addr 46b6e0 trap addr 632d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:06.171785 700059 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.171800 700059 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0015695c0 10 D0713 05:28:06.171808 700059 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:06.172064 700059 usertrap_amd64.go:212] [ 683: 684] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.172095 700059 usertrap_amd64.go:122] [ 683: 684] Allocate a new trap: 0xc0015695c0 11 D0713 05:28:06.172105 700059 usertrap_amd64.go:225] [ 683: 684] Apply the binary patch addr 46af76 trap addr 63370 ([184 35 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:06.178689 700059 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.178717 700059 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0015695c0 12 D0713 05:28:06.178726 700059 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:06.182564 700059 usertrap_amd64.go:212] [ 683: 684] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.182607 700059 usertrap_amd64.go:122] [ 683: 684] Allocate a new trap: 0xc0015695c0 13 D0713 05:28:06.182632 700059 usertrap_amd64.go:225] [ 683: 684] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:06.182686 700059 usertrap_amd64.go:212] [ 683: 684] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.182698 700059 usertrap_amd64.go:122] [ 683: 684] Allocate a new trap: 0xc0015695c0 14 D0713 05:28:06.182706 700059 usertrap_amd64.go:225] [ 683: 684] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:06.182730 700059 task_signals.go:470] [ 683: 683] Notified of signal 23 D0713 05:28:06.182778 700059 task_signals.go:179] [ 683: 683] Restarting syscall 202: interrupted by signal 23 D0713 05:28:06.182798 700059 task_signals.go:220] [ 683: 683] Signal 23: delivering to handler D0713 05:28:06.188070 700059 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.188102 700059 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0015695c0 15 D0713 05:28:06.188112 700059 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 05:28:06.188151 700059 task_exit.go:204] [ 683: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.188169 700059 task_exit.go:204] [ 683: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.188199 700059 task_signals.go:204] [ 683: 684] Signal 683, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.188217 700059 task_exit.go:204] [ 683: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.188223 700059 task_exit.go:204] [ 683: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.188227 700059 task_exit.go:204] [ 683: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.188242 700059 task_signals.go:204] [ 683: 685] Signal 683, PID: 685, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.188256 700059 task_exit.go:204] [ 683: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.188261 700059 task_exit.go:204] [ 683: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.188265 700059 task_exit.go:204] [ 683: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.188277 700059 task_signals.go:204] [ 683: 686] Signal 683, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.188290 700059 task_exit.go:204] [ 683: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.188295 700059 task_exit.go:204] [ 683: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.188299 700059 task_exit.go:204] [ 683: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.188308 700059 task_signals.go:204] [ 683: 687] Signal 683, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.188316 700059 task_exit.go:204] [ 683: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.192282 700059 task_exit.go:204] [ 683: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.192320 700059 task_exit.go:204] [ 683: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.192340 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.192370 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.192379 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.192444 700059 task_exit.go:204] [ 683: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.193020 700059 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.194334 700059 syscalls.go:262] [ 688: 688] Allocating stack with size of 8388608 bytes D0713 05:28:06.194453 700059 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.195434 700059 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.195484 700059 usertrap_amd64.go:106] [ 688: 688] Map a usertrap vma at 65000 D0713 05:28:06.195581 700059 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc0015697d0 1 D0713 05:28:06.195602 700059 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:06.195808 700059 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.195832 700059 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc0015697d0 2 D0713 05:28:06.195842 700059 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:06.198964 700059 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.198988 700059 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc0015697d0 3 D0713 05:28:06.198998 700059 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:06.211059 700059 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.211077 700059 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc0015697d0 4 D0713 05:28:06.211087 700059 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:06.212334 700059 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.212350 700059 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc0015697d0 5 D0713 05:28:06.212361 700059 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:06.224343 700059 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.224374 700059 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc0015697d0 6 D0713 05:28:06.224387 700059 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:06.225249 700059 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.225275 700059 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc0015697d0 7 D0713 05:28:06.225284 700059 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:06.225416 700059 usertrap_amd64.go:212] [ 688: 689] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.225424 700059 usertrap_amd64.go:122] [ 688: 689] Allocate a new trap: 0xc0015697d0 8 D0713 05:28:06.225431 700059 usertrap_amd64.go:225] [ 688: 689] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:06.225590 700059 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.225602 700059 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc0015697d0 9 D0713 05:28:06.225610 700059 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:06.225619 700059 usertrap_amd64.go:212] [ 688: 689] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.225624 700059 usertrap_amd64.go:122] [ 688: 689] Allocate a new trap: 0xc0015697d0 10 D0713 05:28:06.225630 700059 usertrap_amd64.go:225] [ 688: 689] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:06.234009 700059 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.234067 700059 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc0015697d0 11 D0713 05:28:06.234085 700059 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:06.237470 700059 usertrap_amd64.go:212] [ 688: 689] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.237641 700059 usertrap_amd64.go:122] [ 688: 689] Allocate a new trap: 0xc0015697d0 12 D0713 05:28:06.237759 700059 usertrap_amd64.go:225] [ 688: 689] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:06.239534 700059 usertrap_amd64.go:212] [ 688: 689] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.239570 700059 usertrap_amd64.go:122] [ 688: 689] Allocate a new trap: 0xc0015697d0 13 D0713 05:28:06.239595 700059 usertrap_amd64.go:225] [ 688: 689] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:06.239719 700059 task_signals.go:470] [ 688: 688] Notified of signal 23 D0713 05:28:06.239875 700059 task_signals.go:220] [ 688: 688] Signal 23: delivering to handler I0713 05:28:06.248123 700059 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0713 05:28:06.248368 700059 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.248428 700059 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc0015697d0 14 D0713 05:28:06.248451 700059 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:06.248546 700059 task_exit.go:204] [ 688: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.248599 700059 task_exit.go:204] [ 688: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.248624 700059 task_signals.go:204] [ 688: 689] Signal 688, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.248649 700059 task_exit.go:204] [ 688: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.248658 700059 task_exit.go:204] [ 688: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.248663 700059 task_exit.go:204] [ 688: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.248615 700059 task_signals.go:204] [ 688: 692] Signal 688, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.248679 700059 task_exit.go:204] [ 688: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.248719 700059 task_exit.go:204] [ 688: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.248727 700059 task_exit.go:204] [ 688: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.248747 700059 task_signals.go:204] [ 688: 690] Signal 688, PID: 690, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.248767 700059 task_exit.go:204] [ 688: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.248777 700059 task_exit.go:204] [ 688: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.248809 700059 task_exit.go:204] [ 688: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.248823 700059 task_signals.go:204] [ 688: 691] Signal 688, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.248843 700059 task_exit.go:204] [ 688: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.249994 700059 task_exit.go:204] [ 688: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.250037 700059 task_exit.go:204] [ 688: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.250053 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.250685 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.250723 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.250819 700059 task_exit.go:204] [ 688: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.251362 700059 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.252767 700059 syscalls.go:262] [ 693: 693] Allocating stack with size of 8388608 bytes D0713 05:28:06.252877 700059 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.254584 700059 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.254626 700059 usertrap_amd64.go:106] [ 693: 693] Map a usertrap vma at 6a000 D0713 05:28:06.254752 700059 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0015adb90 1 D0713 05:28:06.254814 700059 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:06.257043 700059 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.257145 700059 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0015adb90 2 D0713 05:28:06.257176 700059 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:06.260210 700059 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.260677 700059 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0015adb90 3 D0713 05:28:06.260723 700059 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:06.269496 700059 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.269536 700059 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0015adb90 4 D0713 05:28:06.269551 700059 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:06.270626 700059 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.270661 700059 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0015adb90 5 D0713 05:28:06.270675 700059 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:06.270724 700059 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.270732 700059 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0015adb90 6 D0713 05:28:06.270740 700059 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:06.271026 700059 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.271052 700059 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0015adb90 7 D0713 05:28:06.271062 700059 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:06.271249 700059 usertrap_amd64.go:212] [ 693: 694] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.271297 700059 usertrap_amd64.go:122] [ 693: 694] Allocate a new trap: 0xc0015adb90 8 D0713 05:28:06.271308 700059 usertrap_amd64.go:225] [ 693: 694] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:06.271574 700059 usertrap_amd64.go:212] [ 693: 694] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.271738 700059 usertrap_amd64.go:122] [ 693: 694] Allocate a new trap: 0xc0015adb90 9 D0713 05:28:06.271770 700059 usertrap_amd64.go:225] [ 693: 694] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:06.271786 700059 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.271793 700059 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0015adb90 10 D0713 05:28:06.271803 700059 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:06.279205 700059 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.279227 700059 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0015adb90 11 D0713 05:28:06.279238 700059 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:06.282828 700059 usertrap_amd64.go:212] [ 693: 694] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.282854 700059 usertrap_amd64.go:122] [ 693: 694] Allocate a new trap: 0xc0015adb90 12 D0713 05:28:06.282867 700059 usertrap_amd64.go:225] [ 693: 694] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:06.282903 700059 usertrap_amd64.go:212] [ 693: 694] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.282910 700059 usertrap_amd64.go:122] [ 693: 694] Allocate a new trap: 0xc0015adb90 13 D0713 05:28:06.282918 700059 usertrap_amd64.go:225] [ 693: 694] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:06.282942 700059 task_signals.go:470] [ 693: 693] Notified of signal 23 D0713 05:28:06.283007 700059 task_signals.go:220] [ 693: 693] Signal 23: delivering to handler D0713 05:28:06.288993 700059 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.289021 700059 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0015adb90 14 D0713 05:28:06.289038 700059 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:06.289069 700059 task_exit.go:204] [ 693: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.289089 700059 task_exit.go:204] [ 693: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.289109 700059 task_signals.go:204] [ 693: 697] Signal 693, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.289111 700059 task_signals.go:204] [ 693: 696] Signal 693, PID: 696, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.289124 700059 task_exit.go:204] [ 693: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.289105 700059 task_signals.go:204] [ 693: 694] Signal 693, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.289122 700059 task_signals.go:204] [ 693: 695] Signal 693, PID: 695, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.289135 700059 task_exit.go:204] [ 693: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.289150 700059 task_exit.go:204] [ 693: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.289167 700059 task_exit.go:204] [ 693: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.289182 700059 task_exit.go:204] [ 693: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.289190 700059 task_exit.go:204] [ 693: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.289195 700059 task_exit.go:204] [ 693: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.289204 700059 task_exit.go:204] [ 693: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.289220 700059 task_exit.go:204] [ 693: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.289231 700059 task_exit.go:204] [ 693: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.290374 700059 task_exit.go:204] [ 693: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.290401 700059 task_exit.go:204] [ 693: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.290414 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.290446 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.290458 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.290564 700059 task_exit.go:204] [ 693: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.291052 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.292417 700059 syscalls.go:262] [ 698: 698] Allocating stack with size of 8388608 bytes D0713 05:28:06.292531 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.294332 700059 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.294375 700059 usertrap_amd64.go:106] [ 698: 698] Map a usertrap vma at 69000 D0713 05:28:06.294581 700059 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc000c4a0c0 1 D0713 05:28:06.294616 700059 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:06.296859 700059 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.296884 700059 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc000c4a0c0 2 D0713 05:28:06.296896 700059 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:06.297505 700059 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.297530 700059 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc000c4a0c0 3 D0713 05:28:06.297542 700059 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:06.303524 700059 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.303553 700059 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc000c4a0c0 4 D0713 05:28:06.303565 700059 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:06.304549 700059 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.304576 700059 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc000c4a0c0 5 D0713 05:28:06.304584 700059 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:06.304623 700059 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.304643 700059 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc000c4a0c0 6 D0713 05:28:06.304660 700059 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:06.305103 700059 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.305177 700059 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc000c4a0c0 7 D0713 05:28:06.305202 700059 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:06.305387 700059 usertrap_amd64.go:212] [ 698: 699] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.305413 700059 usertrap_amd64.go:122] [ 698: 699] Allocate a new trap: 0xc000c4a0c0 8 D0713 05:28:06.305423 700059 usertrap_amd64.go:225] [ 698: 699] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:06.305621 700059 usertrap_amd64.go:212] [ 698: 699] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.305674 700059 usertrap_amd64.go:122] [ 698: 699] Allocate a new trap: 0xc000c4a0c0 9 D0713 05:28:06.305691 700059 usertrap_amd64.go:225] [ 698: 699] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:06.305717 700059 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.305726 700059 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc000c4a0c0 10 D0713 05:28:06.305739 700059 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:06.312142 700059 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.312176 700059 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc000c4a0c0 11 D0713 05:28:06.312188 700059 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:06.316314 700059 usertrap_amd64.go:212] [ 698: 699] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.316357 700059 usertrap_amd64.go:122] [ 698: 699] Allocate a new trap: 0xc000c4a0c0 12 D0713 05:28:06.316370 700059 usertrap_amd64.go:225] [ 698: 699] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:06.316422 700059 usertrap_amd64.go:212] [ 698: 699] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.316439 700059 usertrap_amd64.go:122] [ 698: 699] Allocate a new trap: 0xc000c4a0c0 13 D0713 05:28:06.316448 700059 usertrap_amd64.go:225] [ 698: 699] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:06.316505 700059 task_signals.go:470] [ 698: 698] Notified of signal 23 D0713 05:28:06.316558 700059 task_signals.go:220] [ 698: 698] Signal 23: delivering to handler D0713 05:28:06.316706 700059 task_signals.go:470] [ 698: 698] Notified of signal 23 D0713 05:28:06.316738 700059 task_signals.go:179] [ 698: 698] Restarting syscall 202: interrupted by signal 23 D0713 05:28:06.316750 700059 task_signals.go:220] [ 698: 698] Signal 23: delivering to handler D0713 05:28:06.322340 700059 usertrap_amd64.go:212] [ 698: 698] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.322383 700059 usertrap_amd64.go:122] [ 698: 698] Allocate a new trap: 0xc000c4a0c0 14 D0713 05:28:06.322398 700059 usertrap_amd64.go:225] [ 698: 698] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:06.322454 700059 task_exit.go:204] [ 698: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.322475 700059 task_exit.go:204] [ 698: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.322498 700059 task_signals.go:204] [ 698: 701] Signal 698, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.322529 700059 task_exit.go:204] [ 698: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.322538 700059 task_exit.go:204] [ 698: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.322524 700059 task_signals.go:204] [ 698: 699] Signal 698, PID: 699, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.322547 700059 task_exit.go:204] [ 698: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.322506 700059 task_signals.go:204] [ 698: 700] Signal 698, PID: 700, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.322563 700059 task_exit.go:204] [ 698: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.322596 700059 task_exit.go:204] [ 698: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.322603 700059 task_exit.go:204] [ 698: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.322562 700059 task_signals.go:204] [ 698: 702] Signal 698, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.322614 700059 task_exit.go:204] [ 698: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.322624 700059 task_exit.go:204] [ 698: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.322629 700059 task_exit.go:204] [ 698: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.322643 700059 task_signals.go:204] [ 698: 703] Signal 698, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.322665 700059 task_exit.go:204] [ 698: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.322673 700059 task_exit.go:204] [ 698: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.322678 700059 task_exit.go:204] [ 698: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.322691 700059 task_exit.go:204] [ 698: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.323710 700059 task_exit.go:204] [ 698: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.323745 700059 task_exit.go:204] [ 698: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.323766 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.323807 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.323830 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.323981 700059 task_exit.go:204] [ 698: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.324686 700059 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.326069 700059 syscalls.go:262] [ 704: 704] Allocating stack with size of 8388608 bytes D0713 05:28:06.326179 700059 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.327150 700059 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.327190 700059 usertrap_amd64.go:106] [ 704: 704] Map a usertrap vma at 60000 D0713 05:28:06.327305 700059 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc000318270 1 D0713 05:28:06.327336 700059 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:06.327762 700059 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.327779 700059 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc000318270 2 D0713 05:28:06.327792 700059 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:06.328496 700059 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.328518 700059 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc000318270 3 D0713 05:28:06.328532 700059 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:06.334658 700059 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.334696 700059 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc000318270 4 D0713 05:28:06.334709 700059 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:06.335944 700059 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.335974 700059 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc000318270 5 D0713 05:28:06.335986 700059 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:06.336105 700059 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.336131 700059 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc000318270 6 D0713 05:28:06.336140 700059 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:06.336381 700059 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.336406 700059 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc000318270 7 D0713 05:28:06.336415 700059 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:06.336556 700059 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.336575 700059 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc000318270 8 D0713 05:28:06.336588 700059 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:06.336814 700059 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.336842 700059 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc000318270 9 D0713 05:28:06.336856 700059 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:06.336883 700059 usertrap_amd64.go:212] [ 704: 706] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:06.336891 700059 usertrap_amd64.go:122] [ 704: 706] Allocate a new trap: 0xc000318270 10 D0713 05:28:06.336903 700059 usertrap_amd64.go:225] [ 704: 706] Apply the binary patch addr 46b6e0 trap addr 60320 ([184 24 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:06.336935 700059 usertrap_amd64.go:212] [ 704: 706] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.336983 700059 usertrap_amd64.go:122] [ 704: 706] Allocate a new trap: 0xc000318270 11 D0713 05:28:06.336999 700059 usertrap_amd64.go:225] [ 704: 706] Apply the binary patch addr 46b57c trap addr 60370 ([184 202 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:06.345325 700059 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.345354 700059 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc000318270 12 D0713 05:28:06.345363 700059 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:06.347337 700059 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.347370 700059 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc000318270 13 D0713 05:28:06.347383 700059 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:06.347466 700059 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.347497 700059 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc000318270 14 D0713 05:28:06.347507 700059 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:06.347552 700059 task_signals.go:470] [ 704: 704] Notified of signal 23 D0713 05:28:06.347596 700059 task_signals.go:220] [ 704: 704] Signal 23: delivering to handler D0713 05:28:06.354389 700059 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.354444 700059 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc000318270 15 D0713 05:28:06.354472 700059 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 05:28:06.354680 700059 task_exit.go:204] [ 704: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.354718 700059 task_exit.go:204] [ 704: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.354746 700059 task_signals.go:204] [ 704: 707] Signal 704, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.354738 700059 task_signals.go:204] [ 704: 705] Signal 704, PID: 705, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.354764 700059 task_signals.go:204] [ 704: 708] Signal 704, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.354766 700059 task_exit.go:204] [ 704: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.354787 700059 task_signals.go:204] [ 704: 706] Signal 704, PID: 706, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.354804 700059 task_exit.go:204] [ 704: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.354816 700059 task_exit.go:204] [ 704: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.354829 700059 task_exit.go:204] [ 704: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.354838 700059 task_exit.go:204] [ 704: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.354844 700059 task_exit.go:204] [ 704: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.354853 700059 task_exit.go:204] [ 704: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.354883 700059 task_exit.go:204] [ 704: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.354899 700059 task_exit.go:204] [ 704: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.354918 700059 task_exit.go:204] [ 704: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.355893 700059 task_exit.go:204] [ 704: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.355970 700059 task_exit.go:204] [ 704: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.356005 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.356162 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.356255 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.356425 700059 task_exit.go:204] [ 704: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.357196 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.358721 700059 syscalls.go:262] [ 709: 709] Allocating stack with size of 8388608 bytes D0713 05:28:06.358814 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.359642 700059 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.359722 700059 usertrap_amd64.go:106] [ 709: 709] Map a usertrap vma at 63000 D0713 05:28:06.359802 700059 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001804f00 1 D0713 05:28:06.359827 700059 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:06.361075 700059 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.361101 700059 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001804f00 2 D0713 05:28:06.361113 700059 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:06.365394 700059 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.365423 700059 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001804f00 3 D0713 05:28:06.365436 700059 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:06.372495 700059 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.372555 700059 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001804f00 4 D0713 05:28:06.372571 700059 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:06.373631 700059 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.373656 700059 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001804f00 5 D0713 05:28:06.373668 700059 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:06.373715 700059 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.373753 700059 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001804f00 6 D0713 05:28:06.373777 700059 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:06.374054 700059 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.374079 700059 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001804f00 7 D0713 05:28:06.374087 700059 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:06.374293 700059 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.374340 700059 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc001804f00 8 D0713 05:28:06.374361 700059 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:06.374584 700059 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.374612 700059 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc001804f00 9 D0713 05:28:06.374621 700059 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:06.374630 700059 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.374636 700059 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001804f00 10 D0713 05:28:06.374642 700059 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:06.381707 700059 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.381743 700059 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001804f00 11 D0713 05:28:06.381757 700059 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:06.385768 700059 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.385805 700059 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc001804f00 12 D0713 05:28:06.385875 700059 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:06.385958 700059 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.386070 700059 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc001804f00 13 D0713 05:28:06.386097 700059 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:06.386117 700059 task_signals.go:470] [ 709: 709] Notified of signal 23 D0713 05:28:06.386252 700059 task_signals.go:220] [ 709: 709] Signal 23: delivering to handler D0713 05:28:06.391642 700059 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.391662 700059 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001804f00 14 D0713 05:28:06.391676 700059 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:06.391746 700059 task_exit.go:204] [ 709: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.391774 700059 task_signals.go:204] [ 709: 712] Signal 709, PID: 712, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.391814 700059 task_signals.go:204] [ 709: 713] Signal 709, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.391815 700059 task_signals.go:204] [ 709: 714] Signal 709, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.391827 700059 task_exit.go:204] [ 709: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.391874 700059 task_signals.go:204] [ 709: 710] Signal 709, PID: 710, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.391888 700059 task_exit.go:204] [ 709: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.391897 700059 task_signals.go:204] [ 709: 711] Signal 709, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.391912 700059 task_exit.go:204] [ 709: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.391919 700059 task_exit.go:204] [ 709: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.391929 700059 task_exit.go:204] [ 709: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.391937 700059 task_exit.go:204] [ 709: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.391944 700059 task_exit.go:204] [ 709: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.391955 700059 task_exit.go:204] [ 709: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.391962 700059 task_exit.go:204] [ 709: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.391967 700059 task_exit.go:204] [ 709: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.392000 700059 task_exit.go:204] [ 709: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.392011 700059 task_exit.go:204] [ 709: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.392017 700059 task_exit.go:204] [ 709: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.392029 700059 task_exit.go:204] [ 709: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.393314 700059 task_exit.go:204] [ 709: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.393339 700059 task_exit.go:204] [ 709: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.393354 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.393394 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.393506 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.393571 700059 task_exit.go:204] [ 709: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.393973 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.395291 700059 syscalls.go:262] [ 715: 715] Allocating stack with size of 8388608 bytes D0713 05:28:06.395357 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.397059 700059 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.397099 700059 usertrap_amd64.go:106] [ 715: 715] Map a usertrap vma at 64000 D0713 05:28:06.398834 700059 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000b0c2d0 1 D0713 05:28:06.398875 700059 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:06.399318 700059 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.399346 700059 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000b0c2d0 2 D0713 05:28:06.399360 700059 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:06.399875 700059 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.399892 700059 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000b0c2d0 3 D0713 05:28:06.399902 700059 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:06.406762 700059 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.406784 700059 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000b0c2d0 4 D0713 05:28:06.406797 700059 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:06.407933 700059 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.407996 700059 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000b0c2d0 5 D0713 05:28:06.408017 700059 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:06.408094 700059 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.408114 700059 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000b0c2d0 6 D0713 05:28:06.408124 700059 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:06.408564 700059 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.408589 700059 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000b0c2d0 7 D0713 05:28:06.408599 700059 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:06.408810 700059 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.408840 700059 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc000b0c2d0 8 D0713 05:28:06.408853 700059 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:06.409111 700059 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.409132 700059 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000b0c2d0 9 D0713 05:28:06.409169 700059 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:06.409181 700059 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.409185 700059 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc000b0c2d0 10 D0713 05:28:06.409191 700059 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:06.416602 700059 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.416645 700059 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000b0c2d0 11 D0713 05:28:06.416657 700059 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:06.419355 700059 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.419384 700059 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc000b0c2d0 12 D0713 05:28:06.419396 700059 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:06.419515 700059 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.419551 700059 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc000b0c2d0 13 D0713 05:28:06.419566 700059 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:06.419700 700059 task_signals.go:470] [ 715: 715] Notified of signal 23 D0713 05:28:06.419818 700059 task_signals.go:220] [ 715: 715] Signal 23: delivering to handler D0713 05:28:06.427941 700059 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.427992 700059 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000b0c2d0 14 D0713 05:28:06.428009 700059 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:06.428094 700059 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.428170 700059 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.428212 700059 task_signals.go:204] [ 715: 716] Signal 715, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.428243 700059 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.428251 700059 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.428263 700059 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.428281 700059 task_signals.go:204] [ 715: 717] Signal 715, PID: 717, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.428294 700059 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.428302 700059 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.428308 700059 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.428325 700059 task_signals.go:204] [ 715: 718] Signal 715, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.428338 700059 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.428348 700059 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.428354 700059 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.428372 700059 task_signals.go:204] [ 715: 719] Signal 715, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.428387 700059 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.429615 700059 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.429652 700059 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.429669 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.429700 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.429710 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.429892 700059 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.430655 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.432323 700059 syscalls.go:262] [ 720: 720] Allocating stack with size of 8388608 bytes D0713 05:28:06.432414 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.433527 700059 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.433562 700059 usertrap_amd64.go:106] [ 720: 720] Map a usertrap vma at 62000 D0713 05:28:06.433682 700059 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000b0c360 1 D0713 05:28:06.433714 700059 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:06.433967 700059 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.433982 700059 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000b0c360 2 D0713 05:28:06.433989 700059 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:06.434423 700059 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.434455 700059 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000b0c360 3 D0713 05:28:06.434475 700059 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:06.440530 700059 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.440567 700059 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000b0c360 4 D0713 05:28:06.440585 700059 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:06.441739 700059 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.441770 700059 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000b0c360 5 D0713 05:28:06.441780 700059 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:06.441808 700059 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.441812 700059 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000b0c360 6 D0713 05:28:06.441818 700059 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:06.442001 700059 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.442020 700059 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000b0c360 7 D0713 05:28:06.442026 700059 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:06.442125 700059 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.442146 700059 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc000b0c360 8 D0713 05:28:06.442153 700059 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:06.442357 700059 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.442380 700059 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc000b0c360 9 D0713 05:28:06.442388 700059 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:06.442422 700059 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.442440 700059 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000b0c360 10 D0713 05:28:06.442452 700059 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:06.442857 700059 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.442888 700059 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc000b0c360 11 D0713 05:28:06.442925 700059 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:06.442971 700059 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.442980 700059 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc000b0c360 12 D0713 05:28:06.442989 700059 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:06.443008 700059 task_signals.go:470] [ 720: 720] Notified of signal 23 D0713 05:28:06.443045 700059 task_signals.go:220] [ 720: 720] Signal 23: delivering to handler D0713 05:28:06.449347 700059 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.449372 700059 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000b0c360 13 D0713 05:28:06.449384 700059 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:06.453558 700059 task_signals.go:470] [ 720: 720] Notified of signal 23 D0713 05:28:06.453624 700059 task_signals.go:220] [ 720: 720] Signal 23: delivering to handler I0713 05:28:06.459571 700059 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0713 05:28:06.459642 700059 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.459667 700059 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000b0c360 14 D0713 05:28:06.459680 700059 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:06.459718 700059 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.459740 700059 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.459741 700059 task_signals.go:204] [ 720: 723] Signal 720, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.459759 700059 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.459760 700059 task_signals.go:204] [ 720: 724] Signal 720, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.459781 700059 task_signals.go:204] [ 720: 721] Signal 720, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.459807 700059 task_signals.go:204] [ 720: 722] Signal 720, PID: 722, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.459828 700059 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.459833 700059 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.459843 700059 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.459850 700059 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.459854 700059 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.459861 700059 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.459879 700059 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.459883 700059 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.459891 700059 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.460858 700059 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.460877 700059 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.460888 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.460916 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.460923 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.461121 700059 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.461523 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.462932 700059 syscalls.go:262] [ 725: 725] Allocating stack with size of 8388608 bytes D0713 05:28:06.463085 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.464307 700059 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.464344 700059 usertrap_amd64.go:106] [ 725: 725] Map a usertrap vma at 64000 D0713 05:28:06.464424 700059 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000c4acf0 1 D0713 05:28:06.464459 700059 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:06.464708 700059 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.464725 700059 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000c4acf0 2 D0713 05:28:06.464733 700059 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:06.465179 700059 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.465245 700059 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000c4acf0 3 D0713 05:28:06.465261 700059 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:06.470712 700059 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.470738 700059 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000c4acf0 4 D0713 05:28:06.470750 700059 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:06.471944 700059 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.471968 700059 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000c4acf0 5 D0713 05:28:06.471980 700059 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:06.472034 700059 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.472049 700059 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000c4acf0 6 D0713 05:28:06.472059 700059 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:06.472422 700059 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.472492 700059 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000c4acf0 7 D0713 05:28:06.472519 700059 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:06.472668 700059 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.472685 700059 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc000c4acf0 8 D0713 05:28:06.472694 700059 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:06.472876 700059 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.472896 700059 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc000c4acf0 9 D0713 05:28:06.472906 700059 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:06.473109 700059 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.473133 700059 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000c4acf0 10 D0713 05:28:06.473144 700059 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:06.480014 700059 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.480042 700059 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000c4acf0 11 D0713 05:28:06.480057 700059 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:06.484081 700059 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.484118 700059 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc000c4acf0 12 D0713 05:28:06.484132 700059 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:06.484228 700059 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.484256 700059 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc000c4acf0 13 D0713 05:28:06.484270 700059 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:06.484340 700059 task_signals.go:470] [ 725: 725] Notified of signal 23 D0713 05:28:06.484392 700059 task_signals.go:220] [ 725: 725] Signal 23: delivering to handler D0713 05:28:06.490108 700059 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.490140 700059 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc000c4acf0 14 D0713 05:28:06.490151 700059 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:06.490226 700059 task_exit.go:204] [ 725: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.490255 700059 task_exit.go:204] [ 725: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.490256 700059 task_signals.go:204] [ 725: 728] Signal 725, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.490281 700059 task_exit.go:204] [ 725: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.490307 700059 task_signals.go:204] [ 725: 726] Signal 725, PID: 726, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.490280 700059 task_signals.go:204] [ 725: 729] Signal 725, PID: 729, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.490324 700059 task_signals.go:204] [ 725: 727] Signal 725, PID: 727, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.490336 700059 task_exit.go:204] [ 725: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.490346 700059 task_exit.go:204] [ 725: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.490364 700059 task_exit.go:204] [ 725: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.490379 700059 task_exit.go:204] [ 725: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.490393 700059 task_exit.go:204] [ 725: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.490397 700059 task_exit.go:204] [ 725: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.490406 700059 task_exit.go:204] [ 725: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.490464 700059 task_exit.go:204] [ 725: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.490475 700059 task_exit.go:204] [ 725: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.491481 700059 task_exit.go:204] [ 725: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.491510 700059 task_exit.go:204] [ 725: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.491527 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.491556 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.491579 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.491657 700059 task_exit.go:204] [ 725: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.492280 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.493846 700059 syscalls.go:262] [ 730: 730] Allocating stack with size of 8388608 bytes D0713 05:28:06.494000 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.495419 700059 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.495460 700059 usertrap_amd64.go:106] [ 730: 730] Map a usertrap vma at 65000 D0713 05:28:06.495903 700059 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc000b0df50 1 D0713 05:28:06.495941 700059 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:06.496358 700059 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.496400 700059 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc000b0df50 2 D0713 05:28:06.496421 700059 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:06.497129 700059 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.497159 700059 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc000b0df50 3 D0713 05:28:06.497199 700059 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:06.503464 700059 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.503499 700059 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc000b0df50 4 D0713 05:28:06.503512 700059 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:06.504875 700059 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.504905 700059 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc000b0df50 5 D0713 05:28:06.504920 700059 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:06.505092 700059 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.505106 700059 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc000b0df50 6 D0713 05:28:06.505118 700059 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:06.505440 700059 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.505465 700059 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc000b0df50 7 D0713 05:28:06.505475 700059 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:06.505675 700059 usertrap_amd64.go:212] [ 730: 731] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.505698 700059 usertrap_amd64.go:122] [ 730: 731] Allocate a new trap: 0xc000b0df50 8 D0713 05:28:06.505708 700059 usertrap_amd64.go:225] [ 730: 731] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:06.505932 700059 usertrap_amd64.go:212] [ 730: 731] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.505961 700059 usertrap_amd64.go:122] [ 730: 731] Allocate a new trap: 0xc000b0df50 9 D0713 05:28:06.505970 700059 usertrap_amd64.go:225] [ 730: 731] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:06.506125 700059 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.506155 700059 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc000b0df50 10 D0713 05:28:06.506167 700059 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:06.514288 700059 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.514307 700059 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc000b0df50 11 D0713 05:28:06.514319 700059 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:06.517042 700059 usertrap_amd64.go:212] [ 730: 731] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.517100 700059 usertrap_amd64.go:122] [ 730: 731] Allocate a new trap: 0xc000b0df50 12 D0713 05:28:06.517122 700059 usertrap_amd64.go:225] [ 730: 731] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:06.517196 700059 usertrap_amd64.go:212] [ 730: 731] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.517264 700059 usertrap_amd64.go:122] [ 730: 731] Allocate a new trap: 0xc000b0df50 13 D0713 05:28:06.517283 700059 usertrap_amd64.go:225] [ 730: 731] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:06.517355 700059 task_signals.go:470] [ 730: 730] Notified of signal 23 D0713 05:28:06.517462 700059 task_signals.go:220] [ 730: 730] Signal 23: delivering to handler I0713 05:28:06.525891 700059 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0713 05:28:06.525985 700059 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.526000 700059 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc000b0df50 14 D0713 05:28:06.526013 700059 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:06.526061 700059 task_exit.go:204] [ 730: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.526139 700059 task_exit.go:204] [ 730: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.526205 700059 task_signals.go:204] [ 730: 732] Signal 730, PID: 732, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.526224 700059 task_exit.go:204] [ 730: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.526232 700059 task_signals.go:204] [ 730: 731] Signal 730, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.526257 700059 task_signals.go:204] [ 730: 734] Signal 730, PID: 734, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.526325 700059 task_exit.go:204] [ 730: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.526350 700059 task_signals.go:204] [ 730: 733] Signal 730, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.526371 700059 task_exit.go:204] [ 730: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.526378 700059 task_exit.go:204] [ 730: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.526392 700059 task_exit.go:204] [ 730: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.526417 700059 task_exit.go:204] [ 730: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.526424 700059 task_exit.go:204] [ 730: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.526435 700059 task_exit.go:204] [ 730: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.526440 700059 task_exit.go:204] [ 730: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.526454 700059 task_exit.go:204] [ 730: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.527548 700059 task_exit.go:204] [ 730: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.527583 700059 task_exit.go:204] [ 730: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.527598 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.527631 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.527640 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.527866 700059 task_exit.go:204] [ 730: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.528632 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.530558 700059 syscalls.go:262] [ 735: 735] Allocating stack with size of 8388608 bytes D0713 05:28:06.530684 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.531962 700059 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.532002 700059 usertrap_amd64.go:106] [ 735: 735] Map a usertrap vma at 61000 D0713 05:28:06.532113 700059 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc0006ea9f0 1 D0713 05:28:06.532137 700059 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:06.532671 700059 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.532709 700059 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc0006ea9f0 2 D0713 05:28:06.532724 700059 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:06.533639 700059 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.533667 700059 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc0006ea9f0 3 D0713 05:28:06.533682 700059 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:06.544587 700059 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.544630 700059 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc0006ea9f0 4 D0713 05:28:06.544651 700059 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:06.546844 700059 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.546860 700059 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc0006ea9f0 5 D0713 05:28:06.546870 700059 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:06.546936 700059 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.546954 700059 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc0006ea9f0 6 D0713 05:28:06.546960 700059 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:06.547270 700059 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.547294 700059 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc0006ea9f0 7 D0713 05:28:06.547303 700059 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:06.547501 700059 usertrap_amd64.go:212] [ 735: 736] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.547523 700059 usertrap_amd64.go:122] [ 735: 736] Allocate a new trap: 0xc0006ea9f0 8 D0713 05:28:06.547530 700059 usertrap_amd64.go:225] [ 735: 736] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:06.547731 700059 usertrap_amd64.go:212] [ 735: 736] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.547740 700059 usertrap_amd64.go:122] [ 735: 736] Allocate a new trap: 0xc0006ea9f0 9 D0713 05:28:06.547749 700059 usertrap_amd64.go:225] [ 735: 736] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:06.547759 700059 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.547764 700059 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc0006ea9f0 10 D0713 05:28:06.547770 700059 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:06.548263 700059 usertrap_amd64.go:212] [ 735: 736] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.548321 700059 usertrap_amd64.go:122] [ 735: 736] Allocate a new trap: 0xc0006ea9f0 11 D0713 05:28:06.548339 700059 usertrap_amd64.go:225] [ 735: 736] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:06.548359 700059 usertrap_amd64.go:212] [ 735: 736] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.548365 700059 usertrap_amd64.go:122] [ 735: 736] Allocate a new trap: 0xc0006ea9f0 12 D0713 05:28:06.548373 700059 usertrap_amd64.go:225] [ 735: 736] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:06.548389 700059 task_signals.go:470] [ 735: 735] Notified of signal 23 D0713 05:28:06.548466 700059 task_signals.go:220] [ 735: 735] Signal 23: delivering to handler D0713 05:28:06.555533 700059 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.555564 700059 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc0006ea9f0 13 D0713 05:28:06.555578 700059 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:06.558761 700059 task_signals.go:470] [ 735: 735] Notified of signal 23 D0713 05:28:06.558805 700059 task_signals.go:220] [ 735: 735] Signal 23: delivering to handler D0713 05:28:06.566799 700059 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.566834 700059 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc0006ea9f0 14 D0713 05:28:06.566849 700059 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:06.567256 700059 task_exit.go:204] [ 735: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.567290 700059 task_exit.go:204] [ 735: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.567316 700059 task_signals.go:204] [ 735: 738] Signal 735, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.567343 700059 task_exit.go:204] [ 735: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.567314 700059 task_signals.go:204] [ 735: 737] Signal 735, PID: 737, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.567355 700059 task_exit.go:204] [ 735: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.567403 700059 task_exit.go:204] [ 735: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.567343 700059 task_signals.go:204] [ 735: 736] Signal 735, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.567466 700059 task_exit.go:204] [ 735: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.567490 700059 task_signals.go:204] [ 735: 739] Signal 735, PID: 739, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.567525 700059 task_exit.go:204] [ 735: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.567530 700059 task_exit.go:204] [ 735: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.567539 700059 task_exit.go:204] [ 735: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.567570 700059 task_exit.go:204] [ 735: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.567577 700059 task_exit.go:204] [ 735: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.567600 700059 task_exit.go:204] [ 735: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.568802 700059 task_exit.go:204] [ 735: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.568836 700059 task_exit.go:204] [ 735: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.568852 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.568894 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.568929 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.569106 700059 task_exit.go:204] [ 735: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.569810 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.571388 700059 syscalls.go:262] [ 740: 740] Allocating stack with size of 8388608 bytes D0713 05:28:06.571527 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.573162 700059 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.573190 700059 usertrap_amd64.go:106] [ 740: 740] Map a usertrap vma at 61000 D0713 05:28:06.573281 700059 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d32870 1 D0713 05:28:06.573316 700059 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:06.573855 700059 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.573875 700059 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d32870 2 D0713 05:28:06.573882 700059 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:06.574399 700059 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.574419 700059 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d32870 3 D0713 05:28:06.574425 700059 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:06.581121 700059 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.581170 700059 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d32870 4 D0713 05:28:06.581188 700059 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:06.582543 700059 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.582576 700059 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d32870 5 D0713 05:28:06.582592 700059 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:06.582643 700059 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.582655 700059 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d32870 6 D0713 05:28:06.582661 700059 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:06.583006 700059 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.583022 700059 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d32870 7 D0713 05:28:06.583030 700059 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:06.583212 700059 usertrap_amd64.go:212] [ 740: 741] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.583222 700059 usertrap_amd64.go:122] [ 740: 741] Allocate a new trap: 0xc000d32870 8 D0713 05:28:06.583231 700059 usertrap_amd64.go:225] [ 740: 741] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:06.583661 700059 usertrap_amd64.go:212] [ 740: 741] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.583695 700059 usertrap_amd64.go:122] [ 740: 741] Allocate a new trap: 0xc000d32870 9 D0713 05:28:06.583713 700059 usertrap_amd64.go:225] [ 740: 741] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:06.583786 700059 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.583796 700059 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d32870 10 D0713 05:28:06.583806 700059 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:06.592035 700059 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.592057 700059 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d32870 11 D0713 05:28:06.592074 700059 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:06.594893 700059 usertrap_amd64.go:212] [ 740: 741] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.594931 700059 usertrap_amd64.go:122] [ 740: 741] Allocate a new trap: 0xc000d32870 12 D0713 05:28:06.594963 700059 usertrap_amd64.go:225] [ 740: 741] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:06.595067 700059 usertrap_amd64.go:212] [ 740: 741] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.595099 700059 usertrap_amd64.go:122] [ 740: 741] Allocate a new trap: 0xc000d32870 13 D0713 05:28:06.595117 700059 usertrap_amd64.go:225] [ 740: 741] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:06.595185 700059 task_signals.go:470] [ 740: 740] Notified of signal 23 D0713 05:28:06.595263 700059 task_signals.go:220] [ 740: 740] Signal 23: delivering to handler I0713 05:28:06.603499 700059 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0713 05:28:06.603666 700059 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.603710 700059 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d32870 14 D0713 05:28:06.603727 700059 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:06.603889 700059 task_exit.go:204] [ 740: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.603961 700059 task_exit.go:204] [ 740: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.604001 700059 task_signals.go:204] [ 740: 741] Signal 740, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.604020 700059 task_exit.go:204] [ 740: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.604032 700059 task_exit.go:204] [ 740: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.604038 700059 task_exit.go:204] [ 740: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.604060 700059 task_signals.go:204] [ 740: 742] Signal 740, PID: 742, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.604087 700059 task_exit.go:204] [ 740: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.604097 700059 task_exit.go:204] [ 740: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.604102 700059 task_exit.go:204] [ 740: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.604118 700059 task_signals.go:204] [ 740: 743] Signal 740, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.604140 700059 task_exit.go:204] [ 740: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.604148 700059 task_exit.go:204] [ 740: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.604153 700059 task_exit.go:204] [ 740: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.604174 700059 task_signals.go:204] [ 740: 744] Signal 740, PID: 744, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.604201 700059 task_exit.go:204] [ 740: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.605522 700059 task_exit.go:204] [ 740: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.605565 700059 task_exit.go:204] [ 740: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.605588 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.605622 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.605632 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.605808 700059 task_exit.go:204] [ 740: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.606498 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.608285 700059 syscalls.go:262] [ 745: 745] Allocating stack with size of 8388608 bytes D0713 05:28:06.608398 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.612546 700059 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.612594 700059 usertrap_amd64.go:106] [ 745: 745] Map a usertrap vma at 64000 D0713 05:28:06.612812 700059 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000d32900 1 D0713 05:28:06.612851 700059 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:06.613240 700059 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.613272 700059 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000d32900 2 D0713 05:28:06.613291 700059 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:06.614038 700059 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.614070 700059 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000d32900 3 D0713 05:28:06.614082 700059 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:06.621205 700059 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.621253 700059 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000d32900 4 D0713 05:28:06.621273 700059 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:06.622452 700059 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.622479 700059 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000d32900 5 D0713 05:28:06.622491 700059 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:06.622522 700059 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.622527 700059 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000d32900 6 D0713 05:28:06.622532 700059 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:06.622731 700059 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.622758 700059 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000d32900 7 D0713 05:28:06.622768 700059 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:06.622970 700059 usertrap_amd64.go:212] [ 745: 746] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.623004 700059 usertrap_amd64.go:122] [ 745: 746] Allocate a new trap: 0xc000d32900 8 D0713 05:28:06.623018 700059 usertrap_amd64.go:225] [ 745: 746] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:06.623287 700059 usertrap_amd64.go:212] [ 745: 746] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.623312 700059 usertrap_amd64.go:122] [ 745: 746] Allocate a new trap: 0xc000d32900 9 D0713 05:28:06.623369 700059 usertrap_amd64.go:225] [ 745: 746] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:06.623401 700059 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.623408 700059 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000d32900 10 D0713 05:28:06.623416 700059 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:06.630849 700059 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.630872 700059 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000d32900 11 D0713 05:28:06.630881 700059 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:06.633794 700059 usertrap_amd64.go:212] [ 745: 746] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.633830 700059 usertrap_amd64.go:122] [ 745: 746] Allocate a new trap: 0xc000d32900 12 D0713 05:28:06.633843 700059 usertrap_amd64.go:225] [ 745: 746] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:06.633905 700059 usertrap_amd64.go:212] [ 745: 746] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.633944 700059 usertrap_amd64.go:122] [ 745: 746] Allocate a new trap: 0xc000d32900 13 D0713 05:28:06.633960 700059 usertrap_amd64.go:225] [ 745: 746] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:06.634075 700059 task_signals.go:470] [ 745: 745] Notified of signal 23 D0713 05:28:06.634216 700059 task_signals.go:220] [ 745: 745] Signal 23: delivering to handler I0713 05:28:06.642986 700059 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0713 05:28:06.643058 700059 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.643068 700059 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000d32900 14 D0713 05:28:06.643079 700059 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:06.643110 700059 task_exit.go:204] [ 745: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.643132 700059 task_exit.go:204] [ 745: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.643153 700059 task_signals.go:204] [ 745: 748] Signal 745, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.643156 700059 task_signals.go:204] [ 745: 747] Signal 745, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.643178 700059 task_exit.go:204] [ 745: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.643190 700059 task_exit.go:204] [ 745: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.643198 700059 task_exit.go:204] [ 745: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.643176 700059 task_signals.go:204] [ 745: 746] Signal 745, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.643236 700059 task_signals.go:204] [ 745: 749] Signal 745, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.643248 700059 task_exit.go:204] [ 745: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.643261 700059 task_signals.go:204] [ 745: 750] Signal 745, PID: 750, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.643280 700059 task_exit.go:204] [ 745: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.643308 700059 task_exit.go:204] [ 745: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.643333 700059 task_exit.go:204] [ 745: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.643350 700059 task_exit.go:204] [ 745: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.643355 700059 task_exit.go:204] [ 745: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.643364 700059 task_exit.go:204] [ 745: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.643373 700059 task_exit.go:204] [ 745: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.643385 700059 task_exit.go:204] [ 745: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.643392 700059 task_exit.go:204] [ 745: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.644422 700059 task_exit.go:204] [ 745: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.644467 700059 task_exit.go:204] [ 745: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.644483 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.644519 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.644545 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.644633 700059 task_exit.go:204] [ 745: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.645185 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.646831 700059 syscalls.go:262] [ 751: 751] Allocating stack with size of 8388608 bytes D0713 05:28:06.646954 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.647837 700059 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.647878 700059 usertrap_amd64.go:106] [ 751: 751] Map a usertrap vma at 62000 D0713 05:28:06.648090 700059 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc0005abd10 1 D0713 05:28:06.648128 700059 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:06.648461 700059 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.648472 700059 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc0005abd10 2 D0713 05:28:06.648481 700059 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:06.649197 700059 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.649210 700059 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc0005abd10 3 D0713 05:28:06.649219 700059 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:06.654886 700059 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.654921 700059 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc0005abd10 4 D0713 05:28:06.654936 700059 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:06.656065 700059 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.656094 700059 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc0005abd10 5 D0713 05:28:06.656103 700059 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:06.656165 700059 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.656183 700059 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc0005abd10 6 D0713 05:28:06.656192 700059 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:06.656663 700059 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.656691 700059 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc0005abd10 7 D0713 05:28:06.656698 700059 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:06.656838 700059 usertrap_amd64.go:212] [ 751: 752] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.656853 700059 usertrap_amd64.go:122] [ 751: 752] Allocate a new trap: 0xc0005abd10 8 D0713 05:28:06.656859 700059 usertrap_amd64.go:225] [ 751: 752] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:06.657005 700059 usertrap_amd64.go:212] [ 751: 752] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.657029 700059 usertrap_amd64.go:122] [ 751: 752] Allocate a new trap: 0xc0005abd10 9 D0713 05:28:06.657041 700059 usertrap_amd64.go:225] [ 751: 752] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:06.657251 700059 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.657284 700059 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc0005abd10 10 D0713 05:28:06.657300 700059 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:06.664644 700059 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.664667 700059 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc0005abd10 11 D0713 05:28:06.664676 700059 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:06.667765 700059 usertrap_amd64.go:212] [ 751: 752] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.667793 700059 usertrap_amd64.go:122] [ 751: 752] Allocate a new trap: 0xc0005abd10 12 D0713 05:28:06.667803 700059 usertrap_amd64.go:225] [ 751: 752] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:06.667816 700059 usertrap_amd64.go:212] [ 751: 752] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.667821 700059 usertrap_amd64.go:122] [ 751: 752] Allocate a new trap: 0xc0005abd10 13 D0713 05:28:06.667827 700059 usertrap_amd64.go:225] [ 751: 752] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:06.667848 700059 task_signals.go:470] [ 751: 751] Notified of signal 23 D0713 05:28:06.667890 700059 task_signals.go:220] [ 751: 751] Signal 23: delivering to handler D0713 05:28:06.676032 700059 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.676066 700059 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc0005abd10 14 D0713 05:28:06.676082 700059 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:06.676159 700059 task_exit.go:204] [ 751: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.676189 700059 task_exit.go:204] [ 751: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.676212 700059 task_signals.go:204] [ 751: 754] Signal 751, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.676226 700059 task_exit.go:204] [ 751: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.676232 700059 task_exit.go:204] [ 751: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.676237 700059 task_exit.go:204] [ 751: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.676217 700059 task_signals.go:204] [ 751: 753] Signal 751, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.676228 700059 task_signals.go:204] [ 751: 752] Signal 751, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.676259 700059 task_exit.go:204] [ 751: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.676280 700059 task_signals.go:204] [ 751: 756] Signal 751, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.676328 700059 task_signals.go:204] [ 751: 755] Signal 751, PID: 755, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.676344 700059 task_exit.go:204] [ 751: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.676353 700059 task_exit.go:204] [ 751: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.676370 700059 task_exit.go:204] [ 751: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.676379 700059 task_exit.go:204] [ 751: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.676385 700059 task_exit.go:204] [ 751: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.676394 700059 task_exit.go:204] [ 751: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.676401 700059 task_exit.go:204] [ 751: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.676406 700059 task_exit.go:204] [ 751: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.676415 700059 task_exit.go:204] [ 751: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.677620 700059 task_exit.go:204] [ 751: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.677655 700059 task_exit.go:204] [ 751: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.677679 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.677718 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.677743 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.677818 700059 task_exit.go:204] [ 751: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.677954 700059 task_signals.go:470] [ 6: 20] Notified of signal 23 D0713 05:28:06.678058 700059 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 05:28:06.678391 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.679971 700059 syscalls.go:262] [ 757: 757] Allocating stack with size of 8388608 bytes D0713 05:28:06.680120 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.681857 700059 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.681892 700059 usertrap_amd64.go:106] [ 757: 757] Map a usertrap vma at 67000 D0713 05:28:06.681992 700059 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000f40150 1 D0713 05:28:06.682020 700059 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:06.684437 700059 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.684508 700059 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000f40150 2 D0713 05:28:06.684529 700059 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:06.685339 700059 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.685364 700059 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000f40150 3 D0713 05:28:06.685375 700059 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:06.692801 700059 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.692855 700059 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000f40150 4 D0713 05:28:06.692868 700059 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:06.694296 700059 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.694326 700059 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000f40150 5 D0713 05:28:06.694337 700059 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:06.694418 700059 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.694473 700059 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000f40150 6 D0713 05:28:06.694492 700059 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:06.694911 700059 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.694934 700059 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000f40150 7 D0713 05:28:06.694942 700059 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:06.695560 700059 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.695586 700059 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc000f40150 8 D0713 05:28:06.695602 700059 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:06.695805 700059 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.695831 700059 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc000f40150 9 D0713 05:28:06.695842 700059 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:06.695987 700059 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.696001 700059 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000f40150 10 D0713 05:28:06.696012 700059 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:06.705953 700059 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.705987 700059 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000f40150 11 D0713 05:28:06.705998 700059 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:06.706666 700059 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.706700 700059 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc000f40150 12 D0713 05:28:06.706716 700059 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:06.706833 700059 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.706858 700059 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc000f40150 13 D0713 05:28:06.706867 700059 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:06.706926 700059 task_signals.go:470] [ 757: 757] Notified of signal 23 D0713 05:28:06.707126 700059 task_signals.go:220] [ 757: 757] Signal 23: delivering to handler D0713 05:28:06.716917 700059 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.717000 700059 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc000f40150 14 D0713 05:28:06.717018 700059 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:06.717087 700059 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.717110 700059 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.717146 700059 task_signals.go:204] [ 757: 761] Signal 757, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.717151 700059 task_signals.go:204] [ 757: 759] Signal 757, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.717181 700059 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.717215 700059 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.717248 700059 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.717156 700059 task_signals.go:204] [ 757: 760] Signal 757, PID: 760, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.717296 700059 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.717308 700059 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.717183 700059 task_signals.go:204] [ 757: 758] Signal 757, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.717314 700059 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.717383 700059 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.717406 700059 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.717413 700059 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.717428 700059 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.718784 700059 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.718834 700059 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.718869 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.718910 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.718932 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.719080 700059 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.719632 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.721219 700059 syscalls.go:262] [ 762: 762] Allocating stack with size of 8388608 bytes D0713 05:28:06.721340 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.722731 700059 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.722770 700059 usertrap_amd64.go:106] [ 762: 762] Map a usertrap vma at 63000 D0713 05:28:06.722891 700059 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0006eb470 1 D0713 05:28:06.722924 700059 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:06.723316 700059 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.723341 700059 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0006eb470 2 D0713 05:28:06.723355 700059 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:06.724251 700059 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.724274 700059 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0006eb470 3 D0713 05:28:06.724283 700059 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:06.731257 700059 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.731286 700059 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0006eb470 4 D0713 05:28:06.731298 700059 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:06.732760 700059 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.732792 700059 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0006eb470 5 D0713 05:28:06.732808 700059 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:06.732874 700059 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.732881 700059 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0006eb470 6 D0713 05:28:06.732889 700059 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:06.733219 700059 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.733253 700059 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0006eb470 7 D0713 05:28:06.733269 700059 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:06.733440 700059 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.733457 700059 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc0006eb470 8 D0713 05:28:06.733468 700059 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:06.733663 700059 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.733703 700059 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc0006eb470 9 D0713 05:28:06.733719 700059 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:06.733730 700059 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.733735 700059 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0006eb470 10 D0713 05:28:06.733740 700059 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:06.741411 700059 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.741434 700059 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0006eb470 11 D0713 05:28:06.741443 700059 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:06.744375 700059 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.744410 700059 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc0006eb470 12 D0713 05:28:06.744426 700059 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:06.744470 700059 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.744493 700059 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc0006eb470 13 D0713 05:28:06.744782 700059 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:06.744835 700059 task_signals.go:470] [ 762: 762] Notified of signal 23 D0713 05:28:06.744974 700059 task_signals.go:220] [ 762: 762] Signal 23: delivering to handler D0713 05:28:06.755604 700059 task_signals.go:470] [ 762: 762] Notified of signal 23 D0713 05:28:06.757217 700059 task_signals.go:220] [ 762: 762] Signal 23: delivering to handler D0713 05:28:06.758018 700059 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.758090 700059 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0006eb470 14 D0713 05:28:06.758127 700059 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:06.758285 700059 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.758335 700059 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.758389 700059 task_signals.go:204] [ 762: 766] Signal 762, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.758465 700059 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.758500 700059 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.758508 700059 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.758574 700059 task_signals.go:204] [ 762: 764] Signal 762, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.758615 700059 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.758633 700059 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.758638 700059 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.758657 700059 task_signals.go:204] [ 762: 763] Signal 762, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.758668 700059 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.758674 700059 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.758680 700059 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.758692 700059 task_signals.go:204] [ 762: 765] Signal 762, PID: 765, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.758702 700059 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.760444 700059 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.760484 700059 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.760507 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.760610 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.760637 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.760889 700059 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.761637 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.763262 700059 syscalls.go:262] [ 767: 767] Allocating stack with size of 8388608 bytes D0713 05:28:06.763377 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.764529 700059 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.764578 700059 usertrap_amd64.go:106] [ 767: 767] Map a usertrap vma at 61000 D0713 05:28:06.765267 700059 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0004e99e0 1 D0713 05:28:06.765305 700059 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:06.765797 700059 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.765816 700059 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0004e99e0 2 D0713 05:28:06.765828 700059 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:06.766675 700059 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.766741 700059 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0004e99e0 3 D0713 05:28:06.766760 700059 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:06.777688 700059 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.777805 700059 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0004e99e0 4 D0713 05:28:06.777832 700059 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:06.779316 700059 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.779354 700059 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0004e99e0 5 D0713 05:28:06.779368 700059 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:06.779438 700059 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.779458 700059 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0004e99e0 6 D0713 05:28:06.779466 700059 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:06.779759 700059 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.779779 700059 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0004e99e0 7 D0713 05:28:06.779789 700059 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:06.779969 700059 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.779992 700059 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0004e99e0 8 D0713 05:28:06.780005 700059 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:06.780289 700059 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.780305 700059 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0004e99e0 9 D0713 05:28:06.780317 700059 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:06.780600 700059 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.780618 700059 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0004e99e0 10 D0713 05:28:06.780630 700059 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:06.780671 700059 usertrap_amd64.go:212] [ 767: 770] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:06.780684 700059 usertrap_amd64.go:122] [ 767: 770] Allocate a new trap: 0xc0004e99e0 11 D0713 05:28:06.780692 700059 usertrap_amd64.go:225] [ 767: 770] Apply the binary patch addr 46b6e0 trap addr 61370 ([184 24 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:06.789096 700059 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.789118 700059 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0004e99e0 12 D0713 05:28:06.789126 700059 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:06.791421 700059 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.791447 700059 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0004e99e0 13 D0713 05:28:06.791459 700059 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:06.791522 700059 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.791531 700059 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc0004e99e0 14 D0713 05:28:06.791539 700059 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:06.791608 700059 task_signals.go:470] [ 767: 767] Notified of signal 23 D0713 05:28:06.791709 700059 task_signals.go:220] [ 767: 767] Signal 23: delivering to handler D0713 05:28:06.799806 700059 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.799840 700059 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc0004e99e0 15 D0713 05:28:06.799863 700059 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 05:28:06.799942 700059 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.799961 700059 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.799984 700059 task_signals.go:204] [ 767: 770] Signal 767, PID: 770, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.800010 700059 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.800021 700059 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.799982 700059 task_signals.go:204] [ 767: 769] Signal 767, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.800041 700059 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.800024 700059 task_signals.go:204] [ 767: 768] Signal 767, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.800075 700059 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.800106 700059 task_signals.go:204] [ 767: 771] Signal 767, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.800125 700059 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.800137 700059 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.800145 700059 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.800160 700059 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.800168 700059 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.800199 700059 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.801347 700059 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.801383 700059 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.801402 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.801441 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.801448 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.801607 700059 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.802310 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.804011 700059 syscalls.go:262] [ 772: 772] Allocating stack with size of 8388608 bytes D0713 05:28:06.804120 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.805528 700059 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.805569 700059 usertrap_amd64.go:106] [ 772: 772] Map a usertrap vma at 60000 D0713 05:28:06.805682 700059 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0004e9a40 1 D0713 05:28:06.805718 700059 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:06.806055 700059 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.806086 700059 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0004e9a40 2 D0713 05:28:06.806098 700059 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:06.806777 700059 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.806800 700059 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0004e9a40 3 D0713 05:28:06.806809 700059 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:06.813364 700059 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.813399 700059 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0004e9a40 4 D0713 05:28:06.813412 700059 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:06.814710 700059 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.814741 700059 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0004e9a40 5 D0713 05:28:06.814755 700059 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:06.814790 700059 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.814798 700059 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0004e9a40 6 D0713 05:28:06.814807 700059 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:06.815040 700059 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.815056 700059 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0004e9a40 7 D0713 05:28:06.815061 700059 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:06.815170 700059 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.815194 700059 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc0004e9a40 8 D0713 05:28:06.815207 700059 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:06.815317 700059 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.815339 700059 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0004e9a40 9 D0713 05:28:06.815448 700059 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:06.815476 700059 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.815486 700059 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc0004e9a40 10 D0713 05:28:06.815495 700059 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:06.816093 700059 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.816117 700059 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc0004e9a40 11 D0713 05:28:06.816128 700059 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:06.816179 700059 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.816200 700059 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc0004e9a40 12 D0713 05:28:06.816210 700059 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:06.816271 700059 task_signals.go:470] [ 772: 772] Notified of signal 23 D0713 05:28:06.816317 700059 task_signals.go:220] [ 772: 772] Signal 23: delivering to handler D0713 05:28:06.822868 700059 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.822943 700059 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0004e9a40 13 D0713 05:28:06.822961 700059 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:06.826367 700059 task_signals.go:470] [ 772: 772] Notified of signal 23 D0713 05:28:06.826458 700059 task_signals.go:220] [ 772: 772] Signal 23: delivering to handler D0713 05:28:06.835804 700059 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.835842 700059 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0004e9a40 14 D0713 05:28:06.835857 700059 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:06.836029 700059 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.836095 700059 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.836136 700059 task_signals.go:204] [ 772: 773] Signal 772, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.836155 700059 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.836166 700059 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.836178 700059 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.836193 700059 task_signals.go:204] [ 772: 774] Signal 772, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.836201 700059 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.836206 700059 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.836209 700059 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.836221 700059 task_signals.go:204] [ 772: 775] Signal 772, PID: 775, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.836228 700059 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.836233 700059 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.836236 700059 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.836252 700059 task_signals.go:204] [ 772: 776] Signal 772, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.836279 700059 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.836284 700059 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.836288 700059 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.836299 700059 task_signals.go:204] [ 772: 777] Signal 772, PID: 777, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.836313 700059 task_exit.go:204] [ 772: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.837366 700059 task_exit.go:204] [ 772: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.837433 700059 task_exit.go:204] [ 772: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.837450 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.837481 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.837493 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.837621 700059 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.838129 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.839737 700059 syscalls.go:262] [ 778: 778] Allocating stack with size of 8388608 bytes D0713 05:28:06.839888 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.841237 700059 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.841273 700059 usertrap_amd64.go:106] [ 778: 778] Map a usertrap vma at 66000 D0713 05:28:06.841352 700059 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000a8c540 1 D0713 05:28:06.841373 700059 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:06.841589 700059 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.841611 700059 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000a8c540 2 D0713 05:28:06.841620 700059 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:06.842346 700059 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.842370 700059 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000a8c540 3 D0713 05:28:06.842376 700059 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:06.849270 700059 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.849302 700059 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000a8c540 4 D0713 05:28:06.849315 700059 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:06.850585 700059 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.850610 700059 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000a8c540 5 D0713 05:28:06.850621 700059 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:06.850671 700059 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.850679 700059 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000a8c540 6 D0713 05:28:06.850684 700059 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:06.851054 700059 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.851070 700059 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000a8c540 7 D0713 05:28:06.851077 700059 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:06.851344 700059 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.851371 700059 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc000a8c540 8 D0713 05:28:06.851383 700059 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:06.851599 700059 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:06.851644 700059 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc000a8c540 9 D0713 05:28:06.851665 700059 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b6e0 trap addr 662d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:06.851690 700059 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.851708 700059 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc000a8c540 10 D0713 05:28:06.851721 700059 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:06.851797 700059 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.851818 700059 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc000a8c540 11 D0713 05:28:06.851827 700059 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46af76 trap addr 66370 ([184 35 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:06.858998 700059 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.859025 700059 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000a8c540 12 D0713 05:28:06.859035 700059 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:06.861969 700059 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.861999 700059 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc000a8c540 13 D0713 05:28:06.862009 700059 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:06.862047 700059 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.862055 700059 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc000a8c540 14 D0713 05:28:06.862063 700059 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:06.862082 700059 task_signals.go:470] [ 778: 778] Notified of signal 23 D0713 05:28:06.862165 700059 task_signals.go:220] [ 778: 778] Signal 23: delivering to handler D0713 05:28:06.869174 700059 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.869208 700059 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000a8c540 15 D0713 05:28:06.869221 700059 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 05:28:06.869247 700059 task_exit.go:204] [ 778: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.869264 700059 task_exit.go:204] [ 778: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.869284 700059 task_signals.go:204] [ 778: 781] Signal 778, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.869304 700059 task_exit.go:204] [ 778: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.869295 700059 task_signals.go:204] [ 778: 779] Signal 778, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.869282 700059 task_signals.go:204] [ 778: 780] Signal 778, PID: 780, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.869311 700059 task_exit.go:204] [ 778: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.869325 700059 task_exit.go:204] [ 778: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.869346 700059 task_signals.go:204] [ 778: 782] Signal 778, PID: 782, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.869370 700059 task_exit.go:204] [ 778: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.869379 700059 task_exit.go:204] [ 778: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.869395 700059 task_exit.go:204] [ 778: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.869402 700059 task_exit.go:204] [ 778: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.869414 700059 task_exit.go:204] [ 778: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.869468 700059 task_exit.go:204] [ 778: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.869483 700059 task_exit.go:204] [ 778: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.870512 700059 task_exit.go:204] [ 778: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.870583 700059 task_exit.go:204] [ 778: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.870615 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.870661 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.870672 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.870748 700059 task_exit.go:204] [ 778: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.871314 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.873140 700059 syscalls.go:262] [ 783: 783] Allocating stack with size of 8388608 bytes D0713 05:28:06.873343 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.874650 700059 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.874718 700059 usertrap_amd64.go:106] [ 783: 783] Map a usertrap vma at 68000 D0713 05:28:06.874814 700059 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0003196b0 1 D0713 05:28:06.874848 700059 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:06.875159 700059 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.875186 700059 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0003196b0 2 D0713 05:28:06.875198 700059 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:06.877534 700059 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.877554 700059 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0003196b0 3 D0713 05:28:06.877565 700059 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:06.886354 700059 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.886385 700059 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0003196b0 4 D0713 05:28:06.886398 700059 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:06.887493 700059 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.887517 700059 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0003196b0 5 D0713 05:28:06.887525 700059 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:06.887574 700059 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.887580 700059 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0003196b0 6 D0713 05:28:06.887586 700059 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:06.888007 700059 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.888032 700059 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0003196b0 7 D0713 05:28:06.888047 700059 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:06.888200 700059 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.888226 700059 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc0003196b0 8 D0713 05:28:06.888239 700059 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:06.888397 700059 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.888419 700059 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc0003196b0 9 D0713 05:28:06.888427 700059 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:06.888586 700059 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.888615 700059 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0003196b0 10 D0713 05:28:06.888626 700059 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:06.896598 700059 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.896628 700059 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0003196b0 11 D0713 05:28:06.896638 700059 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:06.899107 700059 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.899135 700059 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc0003196b0 12 D0713 05:28:06.899151 700059 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:06.899231 700059 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.899257 700059 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc0003196b0 13 D0713 05:28:06.899266 700059 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:06.899331 700059 task_signals.go:470] [ 783: 783] Notified of signal 23 D0713 05:28:06.899392 700059 task_signals.go:220] [ 783: 783] Signal 23: delivering to handler D0713 05:28:06.906926 700059 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.906965 700059 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0003196b0 14 D0713 05:28:06.906978 700059 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:06.907740 700059 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.907848 700059 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.907883 700059 task_signals.go:204] [ 783: 785] Signal 783, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.907910 700059 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.907914 700059 task_signals.go:204] [ 783: 784] Signal 783, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.907930 700059 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.907938 700059 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.907960 700059 task_signals.go:204] [ 783: 786] Signal 783, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.907988 700059 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.907998 700059 task_signals.go:204] [ 783: 787] Signal 783, PID: 787, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.908011 700059 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.908017 700059 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.908029 700059 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.908038 700059 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.908043 700059 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.908056 700059 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.909203 700059 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.909238 700059 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.909262 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.909310 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.909333 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.909402 700059 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.909991 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.911447 700059 syscalls.go:262] [ 788: 788] Allocating stack with size of 8388608 bytes D0713 05:28:06.911578 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.912633 700059 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.912682 700059 usertrap_amd64.go:106] [ 788: 788] Map a usertrap vma at 60000 D0713 05:28:06.912860 700059 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0006ebd10 1 D0713 05:28:06.912924 700059 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:06.913428 700059 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.913458 700059 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0006ebd10 2 D0713 05:28:06.913472 700059 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:06.914201 700059 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.914228 700059 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0006ebd10 3 D0713 05:28:06.914240 700059 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:06.919990 700059 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.920014 700059 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0006ebd10 4 D0713 05:28:06.920023 700059 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:06.921128 700059 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.921153 700059 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0006ebd10 5 D0713 05:28:06.921163 700059 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:06.921204 700059 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.921228 700059 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0006ebd10 6 D0713 05:28:06.921233 700059 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:06.921467 700059 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.921485 700059 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0006ebd10 7 D0713 05:28:06.921491 700059 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:06.921630 700059 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.921656 700059 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc0006ebd10 8 D0713 05:28:06.921665 700059 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:06.921861 700059 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.921879 700059 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0006ebd10 9 D0713 05:28:06.921887 700059 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:06.921942 700059 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.921956 700059 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc0006ebd10 10 D0713 05:28:06.921965 700059 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:06.929314 700059 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.929339 700059 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0006ebd10 11 D0713 05:28:06.929349 700059 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:06.933147 700059 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.933172 700059 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc0006ebd10 12 D0713 05:28:06.933182 700059 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:06.933239 700059 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.933245 700059 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc0006ebd10 13 D0713 05:28:06.933253 700059 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:06.933267 700059 task_signals.go:470] [ 788: 788] Notified of signal 23 D0713 05:28:06.933338 700059 task_signals.go:220] [ 788: 788] Signal 23: delivering to handler D0713 05:28:06.938598 700059 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.938624 700059 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc0006ebd10 14 D0713 05:28:06.938636 700059 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:06.938701 700059 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.938723 700059 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.938746 700059 task_signals.go:204] [ 788: 791] Signal 788, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.938772 700059 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.938761 700059 task_signals.go:204] [ 788: 790] Signal 788, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.938779 700059 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.938802 700059 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.938842 700059 task_signals.go:204] [ 788: 792] Signal 788, PID: 792, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.938867 700059 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.938890 700059 task_signals.go:204] [ 788: 789] Signal 788, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.938920 700059 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.938928 700059 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.938941 700059 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.938950 700059 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.938955 700059 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.938964 700059 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.940004 700059 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.940047 700059 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.940067 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.940089 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.940109 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.940126 700059 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.940279 700059 task_signals.go:470] [ 6: 13] Notified of signal 23 D0713 05:28:06.940311 700059 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 05:28:06.940842 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.942208 700059 syscalls.go:262] [ 793: 793] Allocating stack with size of 8388608 bytes D0713 05:28:06.942311 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.943225 700059 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.943257 700059 usertrap_amd64.go:106] [ 793: 793] Map a usertrap vma at 6a000 D0713 05:28:06.943473 700059 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0006ebd70 1 D0713 05:28:06.943504 700059 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:06.943725 700059 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.943748 700059 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0006ebd70 2 D0713 05:28:06.943760 700059 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:06.944319 700059 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.944339 700059 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0006ebd70 3 D0713 05:28:06.944348 700059 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:06.951164 700059 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.951198 700059 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0006ebd70 4 D0713 05:28:06.951210 700059 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:06.952278 700059 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.952300 700059 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0006ebd70 5 D0713 05:28:06.952312 700059 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:06.952376 700059 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.952383 700059 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0006ebd70 6 D0713 05:28:06.952390 700059 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:06.952720 700059 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.952741 700059 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0006ebd70 7 D0713 05:28:06.952751 700059 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:06.953029 700059 usertrap_amd64.go:212] [ 793: 794] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.953056 700059 usertrap_amd64.go:122] [ 793: 794] Allocate a new trap: 0xc0006ebd70 8 D0713 05:28:06.953067 700059 usertrap_amd64.go:225] [ 793: 794] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:06.953150 700059 usertrap_amd64.go:212] [ 793: 794] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.953222 700059 usertrap_amd64.go:122] [ 793: 794] Allocate a new trap: 0xc0006ebd70 9 D0713 05:28:06.953242 700059 usertrap_amd64.go:225] [ 793: 794] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:06.953336 700059 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.953360 700059 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0006ebd70 10 D0713 05:28:06.953372 700059 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:06.953512 700059 usertrap_amd64.go:212] [ 793: 794] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.953530 700059 usertrap_amd64.go:122] [ 793: 794] Allocate a new trap: 0xc0006ebd70 11 D0713 05:28:06.953541 700059 usertrap_amd64.go:225] [ 793: 794] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:06.953579 700059 usertrap_amd64.go:212] [ 793: 794] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.953600 700059 usertrap_amd64.go:122] [ 793: 794] Allocate a new trap: 0xc0006ebd70 12 D0713 05:28:06.953611 700059 usertrap_amd64.go:225] [ 793: 794] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:06.953676 700059 task_signals.go:470] [ 793: 796] Notified of signal 23 D0713 05:28:06.953722 700059 task_signals.go:179] [ 793: 796] Restarting syscall 202: interrupted by signal 23 D0713 05:28:06.953733 700059 task_signals.go:220] [ 793: 796] Signal 23: delivering to handler D0713 05:28:06.960391 700059 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.960425 700059 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0006ebd70 13 D0713 05:28:06.960440 700059 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:06.964133 700059 task_signals.go:470] [ 793: 793] Notified of signal 23 D0713 05:28:06.964296 700059 task_signals.go:220] [ 793: 793] Signal 23: delivering to handler D0713 05:28:06.970355 700059 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.970376 700059 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc0006ebd70 14 D0713 05:28:06.970385 700059 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:06.970445 700059 task_exit.go:204] [ 793: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.970476 700059 task_signals.go:204] [ 793: 794] Signal 793, PID: 794, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.970477 700059 task_signals.go:204] [ 793: 797] Signal 793, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.970492 700059 task_exit.go:204] [ 793: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.970523 700059 task_signals.go:204] [ 793: 796] Signal 793, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.970541 700059 task_exit.go:204] [ 793: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.970547 700059 task_signals.go:204] [ 793: 795] Signal 793, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:06.970558 700059 task_exit.go:204] [ 793: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.970591 700059 task_exit.go:204] [ 793: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.970602 700059 task_exit.go:204] [ 793: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.970614 700059 task_exit.go:204] [ 793: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.970620 700059 task_exit.go:204] [ 793: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.970623 700059 task_exit.go:204] [ 793: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.970630 700059 task_exit.go:204] [ 793: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:06.971320 700059 task_exit.go:204] [ 793: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.971343 700059 task_exit.go:204] [ 793: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.971616 700059 task_exit.go:204] [ 793: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:06.971668 700059 task_exit.go:204] [ 793: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.971679 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:06.971701 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:06.971708 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:06.972011 700059 task_exit.go:204] [ 793: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:06.972678 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.973965 700059 syscalls.go:262] [ 798: 798] Allocating stack with size of 8388608 bytes D0713 05:28:06.974040 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:06.975134 700059 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:06.975163 700059 usertrap_amd64.go:106] [ 798: 798] Map a usertrap vma at 61000 D0713 05:28:06.975224 700059 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc001f3a0f0 1 D0713 05:28:06.975252 700059 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:06.975641 700059 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:06.975665 700059 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc001f3a0f0 2 D0713 05:28:06.975677 700059 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:06.976239 700059 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:06.976260 700059 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc001f3a0f0 3 D0713 05:28:06.976268 700059 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:06.981451 700059 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:06.981473 700059 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc001f3a0f0 4 D0713 05:28:06.981481 700059 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:06.982546 700059 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:06.982573 700059 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc001f3a0f0 5 D0713 05:28:06.982583 700059 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:06.982641 700059 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b214:sysno 13 D0713 05:28:06.982656 700059 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc001f3a0f0 6 D0713 05:28:06.982661 700059 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:06.982817 700059 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:06.982832 700059 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc001f3a0f0 7 D0713 05:28:06.982840 700059 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:06.982896 700059 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:06.982903 700059 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc001f3a0f0 8 D0713 05:28:06.982909 700059 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:06.983096 700059 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46af76:sysno 35 D0713 05:28:06.983179 700059 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc001f3a0f0 9 D0713 05:28:06.983199 700059 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:06.983216 700059 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:06.983223 700059 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc001f3a0f0 10 D0713 05:28:06.983232 700059 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:06.990050 700059 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46af29:sysno 293 D0713 05:28:06.990073 700059 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc001f3a0f0 11 D0713 05:28:06.990081 700059 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:06.993650 700059 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46b020:sysno 39 D0713 05:28:06.993681 700059 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc001f3a0f0 12 D0713 05:28:06.993692 700059 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:06.993729 700059 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:06.993735 700059 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc001f3a0f0 13 D0713 05:28:06.993741 700059 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:06.993755 700059 task_signals.go:470] [ 798: 798] Notified of signal 23 D0713 05:28:06.993802 700059 task_signals.go:220] [ 798: 798] Signal 23: delivering to handler D0713 05:28:06.999878 700059 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:06.999899 700059 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc001f3a0f0 14 D0713 05:28:06.999910 700059 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:06.999977 700059 task_exit.go:204] [ 798: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.000001 700059 task_exit.go:204] [ 798: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.000085 700059 task_signals.go:204] [ 798: 800] Signal 798, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.000100 700059 task_signals.go:204] [ 798: 802] Signal 798, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.000101 700059 task_signals.go:204] [ 798: 801] Signal 798, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.000127 700059 task_exit.go:204] [ 798: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.000230 700059 task_signals.go:204] [ 798: 799] Signal 798, PID: 799, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.000262 700059 task_exit.go:204] [ 798: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.000272 700059 task_exit.go:204] [ 798: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.000291 700059 task_exit.go:204] [ 798: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.000305 700059 task_exit.go:204] [ 798: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.000309 700059 task_exit.go:204] [ 798: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.000318 700059 task_exit.go:204] [ 798: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.000354 700059 task_exit.go:204] [ 798: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.000359 700059 task_exit.go:204] [ 798: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.000371 700059 task_exit.go:204] [ 798: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.001424 700059 task_exit.go:204] [ 798: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.001451 700059 task_exit.go:204] [ 798: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.001461 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.001483 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.001489 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.001670 700059 task_exit.go:204] [ 798: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.002209 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.003530 700059 syscalls.go:262] [ 803: 803] Allocating stack with size of 8388608 bytes D0713 05:28:07.003746 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.005206 700059 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.005232 700059 usertrap_amd64.go:106] [ 803: 803] Map a usertrap vma at 61000 D0713 05:28:07.005320 700059 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000a8cfc0 1 D0713 05:28:07.005338 700059 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) executing program D0713 05:28:07.005990 700059 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.006018 700059 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000a8cfc0 2 D0713 05:28:07.006030 700059 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:07.006666 700059 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.006686 700059 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000a8cfc0 3 D0713 05:28:07.006700 700059 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:07.012778 700059 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.012803 700059 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000a8cfc0 4 D0713 05:28:07.012816 700059 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:07.014027 700059 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.014064 700059 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000a8cfc0 5 D0713 05:28:07.014076 700059 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:07.014157 700059 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.014168 700059 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000a8cfc0 6 D0713 05:28:07.014177 700059 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:07.014395 700059 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.014419 700059 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000a8cfc0 7 D0713 05:28:07.014425 700059 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:07.014547 700059 usertrap_amd64.go:212] [ 803: 804] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.014567 700059 usertrap_amd64.go:122] [ 803: 804] Allocate a new trap: 0xc000a8cfc0 8 D0713 05:28:07.014577 700059 usertrap_amd64.go:225] [ 803: 804] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:07.014767 700059 usertrap_amd64.go:212] [ 803: 804] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.014786 700059 usertrap_amd64.go:122] [ 803: 804] Allocate a new trap: 0xc000a8cfc0 9 D0713 05:28:07.014874 700059 usertrap_amd64.go:225] [ 803: 804] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:07.014946 700059 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.014959 700059 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000a8cfc0 10 D0713 05:28:07.014971 700059 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:07.022145 700059 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.022169 700059 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000a8cfc0 11 D0713 05:28:07.022182 700059 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:07.025192 700059 usertrap_amd64.go:212] [ 803: 804] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.025216 700059 usertrap_amd64.go:122] [ 803: 804] Allocate a new trap: 0xc000a8cfc0 12 D0713 05:28:07.025227 700059 usertrap_amd64.go:225] [ 803: 804] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:07.025321 700059 usertrap_amd64.go:212] [ 803: 804] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.025411 700059 usertrap_amd64.go:122] [ 803: 804] Allocate a new trap: 0xc000a8cfc0 13 D0713 05:28:07.025430 700059 usertrap_amd64.go:225] [ 803: 804] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:07.025487 700059 task_signals.go:470] [ 803: 803] Notified of signal 23 D0713 05:28:07.025598 700059 task_signals.go:220] [ 803: 803] Signal 23: delivering to handler D0713 05:28:07.033142 700059 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.033168 700059 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000a8cfc0 14 D0713 05:28:07.033185 700059 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:07.033289 700059 task_exit.go:204] [ 803: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.033313 700059 task_exit.go:204] [ 803: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.033328 700059 task_signals.go:204] [ 803: 805] Signal 803, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.033362 700059 task_signals.go:204] [ 803: 804] Signal 803, PID: 804, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.033361 700059 task_signals.go:204] [ 803: 806] Signal 803, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.033389 700059 task_exit.go:204] [ 803: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.033410 700059 task_exit.go:204] [ 803: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.033417 700059 task_exit.go:204] [ 803: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.033391 700059 task_signals.go:204] [ 803: 807] Signal 803, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.033449 700059 task_exit.go:204] [ 803: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.033480 700059 task_exit.go:204] [ 803: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.033488 700059 task_exit.go:204] [ 803: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.033518 700059 task_exit.go:204] [ 803: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.033541 700059 task_exit.go:204] [ 803: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.033547 700059 task_exit.go:204] [ 803: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.033559 700059 task_exit.go:204] [ 803: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.034574 700059 task_exit.go:204] [ 803: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.034610 700059 task_exit.go:204] [ 803: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.034627 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.034676 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.034788 700059 task_exit.go:204] [ 803: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.036444 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.037789 700059 syscalls.go:262] [ 808: 808] Allocating stack with size of 8388608 bytes D0713 05:28:07.037976 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.039163 700059 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.039242 700059 usertrap_amd64.go:106] [ 808: 808] Map a usertrap vma at 60000 D0713 05:28:07.039360 700059 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001f3a210 1 D0713 05:28:07.039407 700059 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:07.039805 700059 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.039836 700059 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001f3a210 2 D0713 05:28:07.039844 700059 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:07.040562 700059 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.040585 700059 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001f3a210 3 D0713 05:28:07.040594 700059 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:07.048502 700059 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.048580 700059 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001f3a210 4 D0713 05:28:07.048596 700059 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:07.049864 700059 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.049904 700059 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001f3a210 5 D0713 05:28:07.049918 700059 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:07.050077 700059 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.050135 700059 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001f3a210 6 D0713 05:28:07.050154 700059 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:07.050608 700059 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.050630 700059 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001f3a210 7 D0713 05:28:07.050653 700059 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:07.050942 700059 usertrap_amd64.go:212] [ 808: 809] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.050986 700059 usertrap_amd64.go:122] [ 808: 809] Allocate a new trap: 0xc001f3a210 8 D0713 05:28:07.051002 700059 usertrap_amd64.go:225] [ 808: 809] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:07.051161 700059 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.051185 700059 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001f3a210 9 D0713 05:28:07.051195 700059 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:07.051250 700059 usertrap_amd64.go:212] [ 808: 809] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.051271 700059 usertrap_amd64.go:122] [ 808: 809] Allocate a new trap: 0xc001f3a210 10 D0713 05:28:07.051279 700059 usertrap_amd64.go:225] [ 808: 809] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:07.058077 700059 sampler.go:191] Time: Adjusting syscall overhead down to 515 D0713 05:28:07.059148 700059 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.059178 700059 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001f3a210 11 D0713 05:28:07.059190 700059 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:07.062180 700059 usertrap_amd64.go:212] [ 808: 809] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.062273 700059 usertrap_amd64.go:122] [ 808: 809] Allocate a new trap: 0xc001f3a210 12 D0713 05:28:07.062353 700059 usertrap_amd64.go:225] [ 808: 809] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:07.062445 700059 usertrap_amd64.go:212] [ 808: 809] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.062465 700059 usertrap_amd64.go:122] [ 808: 809] Allocate a new trap: 0xc001f3a210 13 D0713 05:28:07.062473 700059 usertrap_amd64.go:225] [ 808: 809] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:07.062531 700059 task_signals.go:470] [ 808: 808] Notified of signal 23 D0713 05:28:07.062614 700059 task_signals.go:220] [ 808: 808] Signal 23: delivering to handler I0713 05:28:07.071748 700059 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0713 05:28:07.071893 700059 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.071925 700059 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001f3a210 14 D0713 05:28:07.071939 700059 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:07.072016 700059 task_exit.go:204] [ 808: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.072040 700059 task_exit.go:204] [ 808: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.072072 700059 task_signals.go:204] [ 808: 811] Signal 808, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.072093 700059 task_signals.go:204] [ 808: 812] Signal 808, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.072110 700059 task_exit.go:204] [ 808: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.072088 700059 task_signals.go:204] [ 808: 810] Signal 808, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.072123 700059 task_exit.go:204] [ 808: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.072128 700059 task_exit.go:204] [ 808: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.072141 700059 task_exit.go:204] [ 808: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.072147 700059 task_exit.go:204] [ 808: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.072151 700059 task_exit.go:204] [ 808: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.072160 700059 task_exit.go:204] [ 808: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.072166 700059 task_exit.go:204] [ 808: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.072170 700059 task_exit.go:204] [ 808: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.072318 700059 task_signals.go:204] [ 808: 809] Signal 808, PID: 809, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.072386 700059 task_exit.go:204] [ 808: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.073893 700059 task_exit.go:204] [ 808: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.074101 700059 task_exit.go:204] [ 808: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.074133 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.074172 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:07.074192 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.074368 700059 task_exit.go:204] [ 808: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.075259 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.077528 700059 syscalls.go:262] [ 813: 813] Allocating stack with size of 8388608 bytes D0713 05:28:07.077976 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.089460 700059 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.089497 700059 usertrap_amd64.go:106] [ 813: 813] Map a usertrap vma at 66000 D0713 05:28:07.089587 700059 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc000a8d7a0 1 D0713 05:28:07.089617 700059 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:07.089885 700059 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.089918 700059 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc000a8d7a0 2 D0713 05:28:07.089928 700059 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:07.090532 700059 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.090586 700059 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc000a8d7a0 3 D0713 05:28:07.090603 700059 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:07.098683 700059 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.098714 700059 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc000a8d7a0 4 D0713 05:28:07.098734 700059 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:07.100305 700059 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.100356 700059 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc000a8d7a0 5 D0713 05:28:07.100375 700059 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:07.100545 700059 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.100584 700059 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc000a8d7a0 6 D0713 05:28:07.100596 700059 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:07.101086 700059 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.101200 700059 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc000a8d7a0 7 D0713 05:28:07.101227 700059 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:07.101448 700059 usertrap_amd64.go:212] [ 813: 814] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.101471 700059 usertrap_amd64.go:122] [ 813: 814] Allocate a new trap: 0xc000a8d7a0 8 D0713 05:28:07.101515 700059 usertrap_amd64.go:225] [ 813: 814] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:07.101896 700059 usertrap_amd64.go:212] [ 813: 814] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.101921 700059 usertrap_amd64.go:122] [ 813: 814] Allocate a new trap: 0xc000a8d7a0 9 D0713 05:28:07.101931 700059 usertrap_amd64.go:225] [ 813: 814] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:07.101954 700059 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.101961 700059 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc000a8d7a0 10 D0713 05:28:07.101969 700059 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:07.110244 700059 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.110317 700059 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc000a8d7a0 11 D0713 05:28:07.110338 700059 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:07.113483 700059 usertrap_amd64.go:212] [ 813: 814] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.113545 700059 usertrap_amd64.go:122] [ 813: 814] Allocate a new trap: 0xc000a8d7a0 12 D0713 05:28:07.113566 700059 usertrap_amd64.go:225] [ 813: 814] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:07.113632 700059 usertrap_amd64.go:212] [ 813: 814] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.113662 700059 usertrap_amd64.go:122] [ 813: 814] Allocate a new trap: 0xc000a8d7a0 13 D0713 05:28:07.113677 700059 usertrap_amd64.go:225] [ 813: 814] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:07.113792 700059 task_signals.go:470] [ 813: 813] Notified of signal 23 D0713 05:28:07.113910 700059 task_signals.go:220] [ 813: 813] Signal 23: delivering to handler I0713 05:28:07.122492 700059 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0713 05:28:07.122663 700059 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.122692 700059 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc000a8d7a0 14 D0713 05:28:07.122705 700059 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:07.122866 700059 task_exit.go:204] [ 813: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.122890 700059 task_exit.go:204] [ 813: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.122918 700059 task_signals.go:204] [ 813: 814] Signal 813, PID: 814, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.122946 700059 task_exit.go:204] [ 813: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.122956 700059 task_exit.go:204] [ 813: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.122962 700059 task_exit.go:204] [ 813: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.122983 700059 task_signals.go:204] [ 813: 815] Signal 813, PID: 815, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.122995 700059 task_exit.go:204] [ 813: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.123003 700059 task_exit.go:204] [ 813: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.123027 700059 task_exit.go:204] [ 813: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.123048 700059 task_signals.go:204] [ 813: 816] Signal 813, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.123061 700059 task_exit.go:204] [ 813: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.123068 700059 task_exit.go:204] [ 813: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.123074 700059 task_exit.go:204] [ 813: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.123090 700059 task_signals.go:204] [ 813: 817] Signal 813, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.123101 700059 task_exit.go:204] [ 813: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.126689 700059 task_exit.go:204] [ 813: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.126706 700059 task_exit.go:204] [ 813: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.126739 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.126774 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.126799 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.127175 700059 task_exit.go:204] [ 813: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.127973 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.130132 700059 syscalls.go:262] [ 818: 818] Allocating stack with size of 8388608 bytes D0713 05:28:07.130485 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.131737 700059 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.131816 700059 usertrap_amd64.go:106] [ 818: 818] Map a usertrap vma at 66000 D0713 05:28:07.131916 700059 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000a8dbf0 1 D0713 05:28:07.131992 700059 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:07.132528 700059 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.132569 700059 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000a8dbf0 2 D0713 05:28:07.132587 700059 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:07.133352 700059 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.133396 700059 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000a8dbf0 3 D0713 05:28:07.133412 700059 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:07.140559 700059 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.140596 700059 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000a8dbf0 4 D0713 05:28:07.140614 700059 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:07.141904 700059 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.141935 700059 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000a8dbf0 5 D0713 05:28:07.141949 700059 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:07.142094 700059 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.142140 700059 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000a8dbf0 6 D0713 05:28:07.142157 700059 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:07.142431 700059 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.142458 700059 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000a8dbf0 7 D0713 05:28:07.142468 700059 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:07.142626 700059 usertrap_amd64.go:212] [ 818: 819] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.142647 700059 usertrap_amd64.go:122] [ 818: 819] Allocate a new trap: 0xc000a8dbf0 8 D0713 05:28:07.142655 700059 usertrap_amd64.go:225] [ 818: 819] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:07.142971 700059 usertrap_amd64.go:212] [ 818: 819] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.143022 700059 usertrap_amd64.go:122] [ 818: 819] Allocate a new trap: 0xc000a8dbf0 9 D0713 05:28:07.143035 700059 usertrap_amd64.go:225] [ 818: 819] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:07.143271 700059 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.143318 700059 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000a8dbf0 10 D0713 05:28:07.143331 700059 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:07.153021 700059 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.153096 700059 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000a8dbf0 11 D0713 05:28:07.153116 700059 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:07.153680 700059 usertrap_amd64.go:212] [ 818: 819] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.153739 700059 usertrap_amd64.go:122] [ 818: 819] Allocate a new trap: 0xc000a8dbf0 12 D0713 05:28:07.153758 700059 usertrap_amd64.go:225] [ 818: 819] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:07.153820 700059 usertrap_amd64.go:212] [ 818: 819] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.153837 700059 usertrap_amd64.go:122] [ 818: 819] Allocate a new trap: 0xc000a8dbf0 13 D0713 05:28:07.153846 700059 usertrap_amd64.go:225] [ 818: 819] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:07.153881 700059 task_signals.go:470] [ 818: 818] Notified of signal 23 D0713 05:28:07.153988 700059 task_signals.go:220] [ 818: 818] Signal 23: delivering to handler I0713 05:28:07.164997 700059 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0713 05:28:07.165085 700059 usertrap_amd64.go:212] [ 818: 819] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:07.165160 700059 usertrap_amd64.go:122] [ 818: 819] Allocate a new trap: 0xc000a8dbf0 14 D0713 05:28:07.165211 700059 usertrap_amd64.go:225] [ 818: 819] Apply the binary patch addr 46b6e0 trap addr 66460 ([184 24 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:07.165248 700059 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.165280 700059 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000a8dbf0 15 D0713 05:28:07.165328 700059 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 05:28:07.165281 700059 task_signals.go:470] [ 818: 818] Notified of signal 23 D0713 05:28:07.165382 700059 task_exit.go:204] [ 818: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.165425 700059 task_exit.go:204] [ 818: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.165476 700059 task_signals.go:204] [ 818: 820] Signal 818, PID: 820, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.165498 700059 task_signals.go:204] [ 818: 822] Signal 818, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.165494 700059 task_signals.go:204] [ 818: 819] Signal 818, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.165511 700059 task_exit.go:204] [ 818: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.165531 700059 task_exit.go:204] [ 818: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.165538 700059 task_exit.go:204] [ 818: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.165477 700059 task_signals.go:204] [ 818: 821] Signal 818, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.165581 700059 task_exit.go:204] [ 818: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.165596 700059 task_exit.go:204] [ 818: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.165608 700059 task_exit.go:204] [ 818: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.165618 700059 task_exit.go:204] [ 818: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.165631 700059 task_exit.go:204] [ 818: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.165644 700059 task_exit.go:204] [ 818: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.165653 700059 task_exit.go:204] [ 818: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.166645 700059 task_exit.go:204] [ 818: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.166676 700059 task_exit.go:204] [ 818: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.166691 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.170146 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.170175 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.170414 700059 task_exit.go:204] [ 818: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.172418 700059 task_signals.go:470] [ 6: 13] Notified of signal 23 D0713 05:28:07.172504 700059 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 05:28:07.172965 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.174358 700059 syscalls.go:262] [ 823: 823] Allocating stack with size of 8388608 bytes D0713 05:28:07.174539 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.181021 700059 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.181062 700059 usertrap_amd64.go:106] [ 823: 823] Map a usertrap vma at 62000 D0713 05:28:07.181173 700059 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc001ed0930 1 D0713 05:28:07.181197 700059 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:07.181718 700059 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.181738 700059 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc001ed0930 2 D0713 05:28:07.181745 700059 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:07.182472 700059 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.182504 700059 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc001ed0930 3 D0713 05:28:07.182515 700059 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:07.191277 700059 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.191343 700059 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc001ed0930 4 D0713 05:28:07.191360 700059 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:07.192705 700059 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.192733 700059 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc001ed0930 5 D0713 05:28:07.192741 700059 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:07.192783 700059 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.192790 700059 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc001ed0930 6 D0713 05:28:07.192796 700059 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:07.193316 700059 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.193342 700059 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc001ed0930 7 D0713 05:28:07.193349 700059 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:07.193631 700059 usertrap_amd64.go:212] [ 823: 824] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.193668 700059 usertrap_amd64.go:122] [ 823: 824] Allocate a new trap: 0xc001ed0930 8 D0713 05:28:07.193683 700059 usertrap_amd64.go:225] [ 823: 824] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:07.193969 700059 usertrap_amd64.go:212] [ 823: 824] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.193995 700059 usertrap_amd64.go:122] [ 823: 824] Allocate a new trap: 0xc001ed0930 9 D0713 05:28:07.194005 700059 usertrap_amd64.go:225] [ 823: 824] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:07.194126 700059 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.194147 700059 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc001ed0930 10 D0713 05:28:07.194157 700059 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:07.195078 700059 usertrap_amd64.go:212] [ 823: 824] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.195199 700059 usertrap_amd64.go:122] [ 823: 824] Allocate a new trap: 0xc001ed0930 11 D0713 05:28:07.195218 700059 usertrap_amd64.go:225] [ 823: 824] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:07.195555 700059 usertrap_amd64.go:212] [ 823: 824] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.195695 700059 usertrap_amd64.go:122] [ 823: 824] Allocate a new trap: 0xc001ed0930 12 D0713 05:28:07.195758 700059 usertrap_amd64.go:225] [ 823: 824] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:07.195879 700059 task_signals.go:470] [ 823: 823] Notified of signal 23 D0713 05:28:07.195993 700059 task_signals.go:220] [ 823: 823] Signal 23: delivering to handler D0713 05:28:07.204020 700059 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.204098 700059 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc001ed0930 13 D0713 05:28:07.204111 700059 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:07.208875 700059 task_signals.go:470] [ 823: 823] Notified of signal 23 D0713 05:28:07.210276 700059 task_signals.go:220] [ 823: 823] Signal 23: delivering to handler D0713 05:28:07.210525 700059 task_signals.go:470] [ 823: 823] Notified of signal 23 D0713 05:28:07.210596 700059 task_signals.go:220] [ 823: 823] Signal 23: delivering to handler D0713 05:28:07.217858 700059 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.217916 700059 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc001ed0930 14 D0713 05:28:07.217939 700059 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:07.218024 700059 task_exit.go:204] [ 823: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.218054 700059 task_signals.go:204] [ 823: 824] Signal 823, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.218119 700059 task_exit.go:204] [ 823: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.218116 700059 task_signals.go:204] [ 823: 827] Signal 823, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.218137 700059 task_signals.go:204] [ 823: 825] Signal 823, PID: 825, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.218150 700059 task_signals.go:204] [ 823: 826] Signal 823, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.218153 700059 task_exit.go:204] [ 823: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.218172 700059 task_exit.go:204] [ 823: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.218203 700059 task_exit.go:204] [ 823: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.218213 700059 task_exit.go:204] [ 823: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.218236 700059 task_exit.go:204] [ 823: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.218248 700059 task_exit.go:204] [ 823: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.218254 700059 task_exit.go:204] [ 823: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.218269 700059 task_exit.go:204] [ 823: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.218287 700059 task_exit.go:204] [ 823: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.218298 700059 task_exit.go:204] [ 823: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.219553 700059 task_exit.go:204] [ 823: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.219614 700059 task_exit.go:204] [ 823: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.219629 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.219683 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.219690 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.219949 700059 task_exit.go:204] [ 823: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.221033 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.222762 700059 syscalls.go:262] [ 828: 828] Allocating stack with size of 8388608 bytes D0713 05:28:07.222880 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.224851 700059 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.224895 700059 usertrap_amd64.go:106] [ 828: 828] Map a usertrap vma at 64000 D0713 05:28:07.225061 700059 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc00139a510 1 D0713 05:28:07.225108 700059 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:07.225693 700059 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.225885 700059 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc00139a510 2 D0713 05:28:07.225988 700059 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:07.226769 700059 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.226811 700059 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc00139a510 3 D0713 05:28:07.226850 700059 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:07.236068 700059 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.236150 700059 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc00139a510 4 D0713 05:28:07.236174 700059 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:07.237514 700059 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.237568 700059 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc00139a510 5 D0713 05:28:07.237586 700059 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:07.237756 700059 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.237786 700059 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc00139a510 6 D0713 05:28:07.237796 700059 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:07.238103 700059 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.238132 700059 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc00139a510 7 D0713 05:28:07.238145 700059 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:07.238380 700059 usertrap_amd64.go:212] [ 828: 829] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.238407 700059 usertrap_amd64.go:122] [ 828: 829] Allocate a new trap: 0xc00139a510 8 D0713 05:28:07.238424 700059 usertrap_amd64.go:225] [ 828: 829] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:07.238766 700059 usertrap_amd64.go:212] [ 828: 829] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.238801 700059 usertrap_amd64.go:122] [ 828: 829] Allocate a new trap: 0xc00139a510 9 D0713 05:28:07.238813 700059 usertrap_amd64.go:225] [ 828: 829] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:07.239215 700059 usertrap_amd64.go:212] [ 828: 830] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.239264 700059 usertrap_amd64.go:122] [ 828: 830] Allocate a new trap: 0xc00139a510 10 D0713 05:28:07.239281 700059 usertrap_amd64.go:225] [ 828: 830] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:07.240616 700059 usertrap_amd64.go:212] [ 828: 829] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.240681 700059 usertrap_amd64.go:122] [ 828: 829] Allocate a new trap: 0xc00139a510 11 D0713 05:28:07.240704 700059 usertrap_amd64.go:225] [ 828: 829] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:07.240780 700059 usertrap_amd64.go:212] [ 828: 829] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.240835 700059 usertrap_amd64.go:122] [ 828: 829] Allocate a new trap: 0xc00139a510 12 D0713 05:28:07.240851 700059 usertrap_amd64.go:225] [ 828: 829] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:07.240920 700059 task_signals.go:470] [ 828: 828] Notified of signal 23 D0713 05:28:07.241186 700059 task_signals.go:220] [ 828: 828] Signal 23: delivering to handler D0713 05:28:07.248873 700059 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.248929 700059 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc00139a510 13 D0713 05:28:07.248970 700059 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:07.252320 700059 task_signals.go:470] [ 828: 828] Notified of signal 23 D0713 05:28:07.252421 700059 task_signals.go:220] [ 828: 828] Signal 23: delivering to handler I0713 05:28:07.261464 700059 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0713 05:28:07.261637 700059 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.261667 700059 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc00139a510 14 D0713 05:28:07.261683 700059 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:07.261864 700059 task_exit.go:204] [ 828: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.261927 700059 task_exit.go:204] [ 828: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.261967 700059 task_signals.go:204] [ 828: 829] Signal 828, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.261986 700059 task_exit.go:204] [ 828: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.261996 700059 task_exit.go:204] [ 828: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.262003 700059 task_exit.go:204] [ 828: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.262037 700059 task_signals.go:204] [ 828: 832] Signal 828, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.262051 700059 task_exit.go:204] [ 828: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.262028 700059 task_signals.go:204] [ 828: 830] Signal 828, PID: 830, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.262059 700059 task_signals.go:204] [ 828: 831] Signal 828, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.262071 700059 task_exit.go:204] [ 828: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.262131 700059 task_exit.go:204] [ 828: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.262284 700059 task_exit.go:204] [ 828: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.262320 700059 task_exit.go:204] [ 828: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.262326 700059 task_exit.go:204] [ 828: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.262338 700059 task_exit.go:204] [ 828: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.263754 700059 task_exit.go:204] [ 828: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.263793 700059 task_exit.go:204] [ 828: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.263817 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.263891 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.263903 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.264081 700059 task_exit.go:204] [ 828: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.264690 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.266483 700059 syscalls.go:262] [ 833: 833] Allocating stack with size of 8388608 bytes D0713 05:28:07.266915 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.268527 700059 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.268604 700059 usertrap_amd64.go:106] [ 833: 833] Map a usertrap vma at 61000 D0713 05:28:07.268786 700059 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc0021147b0 1 D0713 05:28:07.268835 700059 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:07.269465 700059 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.269505 700059 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc0021147b0 2 D0713 05:28:07.269521 700059 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:07.281073 700059 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.281141 700059 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc0021147b0 3 D0713 05:28:07.281166 700059 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:07.289339 700059 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.289392 700059 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc0021147b0 4 D0713 05:28:07.289407 700059 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:07.291023 700059 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.291060 700059 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc0021147b0 5 D0713 05:28:07.291071 700059 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:07.291120 700059 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.291126 700059 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc0021147b0 6 D0713 05:28:07.291131 700059 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:07.291559 700059 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.291628 700059 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc0021147b0 7 D0713 05:28:07.291648 700059 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:07.291930 700059 usertrap_amd64.go:212] [ 833: 834] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.291957 700059 usertrap_amd64.go:122] [ 833: 834] Allocate a new trap: 0xc0021147b0 8 D0713 05:28:07.291971 700059 usertrap_amd64.go:225] [ 833: 834] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:07.292159 700059 usertrap_amd64.go:212] [ 833: 834] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.292173 700059 usertrap_amd64.go:122] [ 833: 834] Allocate a new trap: 0xc0021147b0 9 D0713 05:28:07.292180 700059 usertrap_amd64.go:225] [ 833: 834] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:07.292238 700059 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.292251 700059 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc0021147b0 10 D0713 05:28:07.292257 700059 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:07.292398 700059 usertrap_amd64.go:212] [ 833: 836] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:07.292419 700059 usertrap_amd64.go:122] [ 833: 836] Allocate a new trap: 0xc0021147b0 11 D0713 05:28:07.292427 700059 usertrap_amd64.go:225] [ 833: 836] Apply the binary patch addr 46b6e0 trap addr 61370 ([184 24 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:07.305650 700059 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.305702 700059 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc0021147b0 12 D0713 05:28:07.305719 700059 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:07.318796 700059 usertrap_amd64.go:212] [ 833: 834] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.318862 700059 usertrap_amd64.go:122] [ 833: 834] Allocate a new trap: 0xc0021147b0 13 D0713 05:28:07.318901 700059 usertrap_amd64.go:225] [ 833: 834] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:07.319069 700059 usertrap_amd64.go:212] [ 833: 834] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.319118 700059 usertrap_amd64.go:122] [ 833: 834] Allocate a new trap: 0xc0021147b0 14 D0713 05:28:07.319139 700059 usertrap_amd64.go:225] [ 833: 834] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:07.319187 700059 task_signals.go:470] [ 833: 833] Notified of signal 23 D0713 05:28:07.320689 700059 task_signals.go:220] [ 833: 833] Signal 23: delivering to handler D0713 05:28:07.320807 700059 task_signals.go:470] [ 833: 833] Notified of signal 23 D0713 05:28:07.320854 700059 task_signals.go:220] [ 833: 833] Signal 23: delivering to handler I0713 05:28:07.321479 700059 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0713 05:28:07.321581 700059 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.321593 700059 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc0021147b0 15 D0713 05:28:07.321611 700059 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 05:28:07.321684 700059 task_exit.go:204] [ 833: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.321722 700059 task_exit.go:204] [ 833: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.321755 700059 task_signals.go:204] [ 833: 836] Signal 833, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.321752 700059 task_signals.go:204] [ 833: 834] Signal 833, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.321771 700059 task_exit.go:204] [ 833: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.321787 700059 task_signals.go:204] [ 833: 837] Signal 833, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.321793 700059 task_signals.go:204] [ 833: 835] Signal 833, PID: 835, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.321813 700059 task_exit.go:204] [ 833: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.321835 700059 task_exit.go:204] [ 833: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.321854 700059 task_exit.go:204] [ 833: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.321864 700059 task_exit.go:204] [ 833: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.321870 700059 task_exit.go:204] [ 833: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.321880 700059 task_exit.go:204] [ 833: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.321888 700059 task_exit.go:204] [ 833: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.321913 700059 task_exit.go:204] [ 833: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.321923 700059 task_exit.go:204] [ 833: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.323066 700059 task_exit.go:204] [ 833: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.323094 700059 task_exit.go:204] [ 833: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.323117 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.323169 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.323211 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.323431 700059 task_exit.go:204] [ 833: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.324109 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.325778 700059 syscalls.go:262] [ 838: 838] Allocating stack with size of 8388608 bytes D0713 05:28:07.326054 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.327436 700059 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.327478 700059 usertrap_amd64.go:106] [ 838: 838] Map a usertrap vma at 63000 D0713 05:28:07.327590 700059 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f40120 1 D0713 05:28:07.327657 700059 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:07.328263 700059 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.328295 700059 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f40120 2 D0713 05:28:07.328310 700059 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:07.329972 700059 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.330000 700059 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f40120 3 D0713 05:28:07.330015 700059 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:07.338253 700059 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.338305 700059 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f40120 4 D0713 05:28:07.338326 700059 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:07.339558 700059 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.339602 700059 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f40120 5 D0713 05:28:07.339619 700059 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:07.339704 700059 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.339728 700059 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f40120 6 D0713 05:28:07.339739 700059 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:07.340117 700059 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.340142 700059 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f40120 7 D0713 05:28:07.340165 700059 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:07.340397 700059 usertrap_amd64.go:212] [ 838: 839] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.340425 700059 usertrap_amd64.go:122] [ 838: 839] Allocate a new trap: 0xc000f40120 8 D0713 05:28:07.340436 700059 usertrap_amd64.go:225] [ 838: 839] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:07.340780 700059 usertrap_amd64.go:212] [ 838: 839] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.340824 700059 usertrap_amd64.go:122] [ 838: 839] Allocate a new trap: 0xc000f40120 9 D0713 05:28:07.340843 700059 usertrap_amd64.go:225] [ 838: 839] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:07.340860 700059 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.340888 700059 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f40120 10 D0713 05:28:07.340900 700059 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:07.341019 700059 usertrap_amd64.go:212] [ 838: 841] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:07.341047 700059 usertrap_amd64.go:122] [ 838: 841] Allocate a new trap: 0xc000f40120 11 D0713 05:28:07.341061 700059 usertrap_amd64.go:225] [ 838: 841] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:07.350149 700059 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.350187 700059 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f40120 12 D0713 05:28:07.350204 700059 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:07.353372 700059 usertrap_amd64.go:212] [ 838: 839] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.353414 700059 usertrap_amd64.go:122] [ 838: 839] Allocate a new trap: 0xc000f40120 13 D0713 05:28:07.353432 700059 usertrap_amd64.go:225] [ 838: 839] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:07.353485 700059 usertrap_amd64.go:212] [ 838: 839] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.353493 700059 usertrap_amd64.go:122] [ 838: 839] Allocate a new trap: 0xc000f40120 14 D0713 05:28:07.353503 700059 usertrap_amd64.go:225] [ 838: 839] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:07.353528 700059 task_signals.go:470] [ 838: 838] Notified of signal 23 D0713 05:28:07.353606 700059 task_signals.go:220] [ 838: 838] Signal 23: delivering to handler D0713 05:28:07.362827 700059 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.362889 700059 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f40120 15 D0713 05:28:07.362908 700059 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 05:28:07.362973 700059 task_exit.go:204] [ 838: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.363003 700059 task_exit.go:204] [ 838: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.363044 700059 task_signals.go:204] [ 838: 842] Signal 838, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.363061 700059 task_exit.go:204] [ 838: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.363053 700059 task_signals.go:204] [ 838: 839] Signal 838, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.363047 700059 task_signals.go:204] [ 838: 840] Signal 838, PID: 840, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.363067 700059 task_exit.go:204] [ 838: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.363100 700059 task_exit.go:204] [ 838: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.363150 700059 task_signals.go:204] [ 838: 843] Signal 838, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.363162 700059 task_exit.go:204] [ 838: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.363173 700059 task_exit.go:204] [ 838: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.363198 700059 task_exit.go:204] [ 838: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.363204 700059 task_exit.go:204] [ 838: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.363160 700059 task_signals.go:204] [ 838: 841] Signal 838, PID: 841, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.363219 700059 task_exit.go:204] [ 838: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.363228 700059 task_exit.go:204] [ 838: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.363232 700059 task_exit.go:204] [ 838: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.363246 700059 task_exit.go:204] [ 838: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.363298 700059 task_exit.go:204] [ 838: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.363315 700059 task_exit.go:204] [ 838: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.364703 700059 task_exit.go:204] [ 838: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.364735 700059 task_exit.go:204] [ 838: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.364751 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.364788 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.364811 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.365009 700059 task_exit.go:204] [ 838: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.365718 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.367391 700059 syscalls.go:262] [ 844: 844] Allocating stack with size of 8388608 bytes D0713 05:28:07.367533 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.368738 700059 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.368789 700059 usertrap_amd64.go:106] [ 844: 844] Map a usertrap vma at 68000 D0713 05:28:07.368895 700059 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000c4a540 1 D0713 05:28:07.368923 700059 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:07.369351 700059 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.369373 700059 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000c4a540 2 D0713 05:28:07.369396 700059 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:07.370421 700059 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.370449 700059 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000c4a540 3 D0713 05:28:07.370459 700059 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:07.378202 700059 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.378273 700059 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000c4a540 4 D0713 05:28:07.378287 700059 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:07.379760 700059 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.379827 700059 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000c4a540 5 D0713 05:28:07.379846 700059 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:07.379990 700059 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.380015 700059 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000c4a540 6 D0713 05:28:07.380027 700059 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:07.380335 700059 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.380362 700059 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000c4a540 7 D0713 05:28:07.380374 700059 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:07.380589 700059 usertrap_amd64.go:212] [ 844: 845] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.380634 700059 usertrap_amd64.go:122] [ 844: 845] Allocate a new trap: 0xc000c4a540 8 D0713 05:28:07.380648 700059 usertrap_amd64.go:225] [ 844: 845] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:07.381037 700059 usertrap_amd64.go:212] [ 844: 846] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.381072 700059 usertrap_amd64.go:122] [ 844: 846] Allocate a new trap: 0xc000c4a540 9 D0713 05:28:07.381089 700059 usertrap_amd64.go:225] [ 844: 846] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:07.381261 700059 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.381286 700059 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000c4a540 10 D0713 05:28:07.381298 700059 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:07.391178 700059 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.391239 700059 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000c4a540 11 D0713 05:28:07.391260 700059 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:07.391788 700059 usertrap_amd64.go:212] [ 844: 845] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.391846 700059 usertrap_amd64.go:122] [ 844: 845] Allocate a new trap: 0xc000c4a540 12 D0713 05:28:07.391870 700059 usertrap_amd64.go:225] [ 844: 845] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:07.391987 700059 usertrap_amd64.go:212] [ 844: 845] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.392013 700059 usertrap_amd64.go:122] [ 844: 845] Allocate a new trap: 0xc000c4a540 13 D0713 05:28:07.392021 700059 usertrap_amd64.go:225] [ 844: 845] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:07.392073 700059 task_signals.go:470] [ 844: 844] Notified of signal 23 D0713 05:28:07.392169 700059 task_signals.go:220] [ 844: 844] Signal 23: delivering to handler D0713 05:28:07.403378 700059 task_signals.go:470] [ 844: 844] Notified of signal 23 D0713 05:28:07.403617 700059 task_signals.go:220] [ 844: 844] Signal 23: delivering to handler I0713 05:28:07.404200 700059 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0713 05:28:07.404303 700059 usertrap_amd64.go:212] [ 844: 844] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.404326 700059 usertrap_amd64.go:122] [ 844: 844] Allocate a new trap: 0xc000c4a540 14 D0713 05:28:07.404342 700059 usertrap_amd64.go:225] [ 844: 844] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:07.404398 700059 task_exit.go:204] [ 844: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.404430 700059 task_exit.go:204] [ 844: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.404458 700059 task_signals.go:204] [ 844: 848] Signal 844, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.404472 700059 task_signals.go:204] [ 844: 847] Signal 844, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.404483 700059 task_exit.go:204] [ 844: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.404455 700059 task_signals.go:204] [ 844: 846] Signal 844, PID: 846, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.404513 700059 task_exit.go:204] [ 844: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.404527 700059 task_exit.go:204] [ 844: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.404555 700059 task_signals.go:204] [ 844: 845] Signal 844, PID: 845, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.404574 700059 task_exit.go:204] [ 844: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.404612 700059 task_exit.go:204] [ 844: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.404627 700059 task_exit.go:204] [ 844: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.404642 700059 task_exit.go:204] [ 844: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.404653 700059 task_exit.go:204] [ 844: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.404656 700059 task_exit.go:204] [ 844: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.404670 700059 task_exit.go:204] [ 844: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.406215 700059 task_exit.go:204] [ 844: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.406243 700059 task_exit.go:204] [ 844: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.406258 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.406297 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.406306 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.406437 700059 task_exit.go:204] [ 844: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.407069 700059 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.408864 700059 syscalls.go:262] [ 849: 849] Allocating stack with size of 8388608 bytes D0713 05:28:07.409019 700059 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.410317 700059 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.410361 700059 usertrap_amd64.go:106] [ 849: 849] Map a usertrap vma at 67000 D0713 05:28:07.410422 700059 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc000c4a780 1 D0713 05:28:07.410459 700059 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:07.411065 700059 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.411113 700059 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc000c4a780 2 D0713 05:28:07.411133 700059 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:07.412038 700059 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.412068 700059 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc000c4a780 3 D0713 05:28:07.412103 700059 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:07.422085 700059 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.422131 700059 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc000c4a780 4 D0713 05:28:07.422147 700059 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:07.423586 700059 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.423619 700059 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc000c4a780 5 D0713 05:28:07.423639 700059 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:07.423703 700059 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.423712 700059 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc000c4a780 6 D0713 05:28:07.423719 700059 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:07.424192 700059 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.424215 700059 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc000c4a780 7 D0713 05:28:07.424227 700059 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:07.424459 700059 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.424483 700059 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc000c4a780 8 D0713 05:28:07.424496 700059 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:07.424684 700059 usertrap_amd64.go:212] [ 849: 851] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.424705 700059 usertrap_amd64.go:122] [ 849: 851] Allocate a new trap: 0xc000c4a780 9 D0713 05:28:07.424715 700059 usertrap_amd64.go:225] [ 849: 851] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:07.424881 700059 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.425107 700059 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc000c4a780 10 D0713 05:28:07.425180 700059 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:07.436134 700059 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.436165 700059 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc000c4a780 11 D0713 05:28:07.436188 700059 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:07.436218 700059 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.436236 700059 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc000c4a780 12 D0713 05:28:07.436245 700059 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:07.436350 700059 task_signals.go:470] [ 849: 849] Notified of signal 23 D0713 05:28:07.436476 700059 task_signals.go:220] [ 849: 849] Signal 23: delivering to handler D0713 05:28:07.438036 700059 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.438180 700059 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc000c4a780 13 D0713 05:28:07.438210 700059 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:07.447022 700059 task_signals.go:470] [ 849: 849] Notified of signal 23 D0713 05:28:07.448922 700059 task_signals.go:220] [ 849: 849] Signal 23: delivering to handler I0713 05:28:07.458742 700059 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0713 05:28:07.458860 700059 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.458885 700059 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc000c4a780 14 D0713 05:28:07.458904 700059 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:07.458976 700059 task_exit.go:204] [ 849: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.459024 700059 task_signals.go:204] [ 849: 851] Signal 849, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.459051 700059 task_exit.go:204] [ 849: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.459114 700059 task_signals.go:204] [ 849: 850] Signal 849, PID: 850, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.459136 700059 task_signals.go:204] [ 849: 853] Signal 849, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.459145 700059 task_signals.go:204] [ 849: 854] Signal 849, PID: 854, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.459161 700059 task_exit.go:204] [ 849: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.459217 700059 task_signals.go:204] [ 849: 852] Signal 849, PID: 852, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.459254 700059 task_exit.go:204] [ 849: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.459264 700059 task_exit.go:204] [ 849: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.459277 700059 task_exit.go:204] [ 849: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.459291 700059 task_exit.go:204] [ 849: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.459296 700059 task_exit.go:204] [ 849: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.459306 700059 task_exit.go:204] [ 849: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.459319 700059 task_exit.go:204] [ 849: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.459327 700059 task_exit.go:204] [ 849: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.459350 700059 task_exit.go:204] [ 849: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.459468 700059 task_exit.go:204] [ 849: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.459490 700059 task_exit.go:204] [ 849: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.459521 700059 task_exit.go:204] [ 849: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.461279 700059 task_exit.go:204] [ 849: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.461315 700059 task_exit.go:204] [ 849: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.461344 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.461394 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.461418 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.461580 700059 task_exit.go:204] [ 849: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.462399 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.463978 700059 syscalls.go:262] [ 855: 855] Allocating stack with size of 8388608 bytes D0713 05:28:07.464078 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.465428 700059 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.465471 700059 usertrap_amd64.go:106] [ 855: 855] Map a usertrap vma at 68000 D0713 05:28:07.465561 700059 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000c4ab40 1 D0713 05:28:07.465593 700059 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:07.466144 700059 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.466168 700059 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000c4ab40 2 D0713 05:28:07.466187 700059 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:07.466762 700059 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.466792 700059 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000c4ab40 3 D0713 05:28:07.466804 700059 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:07.472348 700059 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.472380 700059 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000c4ab40 4 D0713 05:28:07.472393 700059 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:07.473668 700059 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.473697 700059 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000c4ab40 5 D0713 05:28:07.473711 700059 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:07.473759 700059 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.473767 700059 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000c4ab40 6 D0713 05:28:07.473777 700059 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:07.474019 700059 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.474042 700059 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000c4ab40 7 D0713 05:28:07.474052 700059 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:07.474216 700059 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.474243 700059 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc000c4ab40 8 D0713 05:28:07.474256 700059 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:07.474453 700059 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:07.474476 700059 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc000c4ab40 9 D0713 05:28:07.474497 700059 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b6e0 trap addr 682d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:07.474633 700059 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.474655 700059 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc000c4ab40 10 D0713 05:28:07.474663 700059 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:07.474708 700059 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.474725 700059 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc000c4ab40 11 D0713 05:28:07.474734 700059 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46af76 trap addr 68370 ([184 35 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:07.484401 700059 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.484438 700059 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000c4ab40 12 D0713 05:28:07.484454 700059 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:07.484823 700059 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.484854 700059 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc000c4ab40 13 D0713 05:28:07.484868 700059 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:07.484910 700059 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.484922 700059 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc000c4ab40 14 D0713 05:28:07.484931 700059 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:07.485026 700059 task_signals.go:470] [ 855: 855] Notified of signal 23 D0713 05:28:07.485074 700059 task_signals.go:220] [ 855: 855] Signal 23: delivering to handler D0713 05:28:07.495340 700059 task_signals.go:470] [ 855: 855] Notified of signal 23 D0713 05:28:07.496286 700059 task_signals.go:220] [ 855: 855] Signal 23: delivering to handler D0713 05:28:07.496727 700059 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.496747 700059 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc000c4ab40 15 D0713 05:28:07.496763 700059 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 05:28:07.496829 700059 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.496866 700059 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.496888 700059 task_signals.go:204] [ 855: 857] Signal 855, PID: 857, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.496924 700059 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.496913 700059 task_signals.go:204] [ 855: 859] Signal 855, PID: 859, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.496977 700059 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.496986 700059 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.496895 700059 task_signals.go:204] [ 855: 858] Signal 855, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.497021 700059 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.497031 700059 task_signals.go:204] [ 855: 856] Signal 855, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.497044 700059 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.497062 700059 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.497071 700059 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.497120 700059 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.497148 700059 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.497163 700059 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.498534 700059 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.498562 700059 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.498576 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.498611 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.498623 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.498714 700059 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.499446 700059 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.501241 700059 syscalls.go:262] [ 860: 860] Allocating stack with size of 8388608 bytes D0713 05:28:07.501540 700059 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.502375 700059 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.502418 700059 usertrap_amd64.go:106] [ 860: 860] Map a usertrap vma at 69000 D0713 05:28:07.502491 700059 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000f40f90 1 D0713 05:28:07.502518 700059 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:07.502898 700059 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.502924 700059 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000f40f90 2 D0713 05:28:07.502937 700059 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:07.503695 700059 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.503724 700059 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000f40f90 3 D0713 05:28:07.503736 700059 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:07.510104 700059 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.510136 700059 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000f40f90 4 D0713 05:28:07.510150 700059 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:07.511720 700059 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.511749 700059 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000f40f90 5 D0713 05:28:07.511760 700059 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:07.511816 700059 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.511832 700059 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000f40f90 6 D0713 05:28:07.511838 700059 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:07.512033 700059 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.512047 700059 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000f40f90 7 D0713 05:28:07.512053 700059 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:07.512207 700059 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.512228 700059 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc000f40f90 8 D0713 05:28:07.512239 700059 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:07.512477 700059 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.512501 700059 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc000f40f90 9 D0713 05:28:07.512513 700059 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:07.512609 700059 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.512626 700059 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000f40f90 10 D0713 05:28:07.512640 700059 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:07.521236 700059 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.521269 700059 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000f40f90 11 D0713 05:28:07.521282 700059 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:07.524078 700059 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.524106 700059 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc000f40f90 12 D0713 05:28:07.524119 700059 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:07.524191 700059 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.524212 700059 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc000f40f90 13 D0713 05:28:07.524224 700059 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:07.524288 700059 task_signals.go:470] [ 860: 860] Notified of signal 23 D0713 05:28:07.524379 700059 task_signals.go:220] [ 860: 860] Signal 23: delivering to handler D0713 05:28:07.532884 700059 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.532920 700059 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000f40f90 14 D0713 05:28:07.532936 700059 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:07.533027 700059 task_exit.go:204] [ 860: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.533059 700059 task_exit.go:204] [ 860: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.533098 700059 task_signals.go:204] [ 860: 864] Signal 860, PID: 864, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.533111 700059 task_signals.go:204] [ 860: 861] Signal 860, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.533099 700059 task_signals.go:204] [ 860: 862] Signal 860, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.533131 700059 task_exit.go:204] [ 860: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.533173 700059 task_exit.go:204] [ 860: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.533206 700059 task_exit.go:204] [ 860: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.533261 700059 task_exit.go:204] [ 860: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.533282 700059 task_exit.go:204] [ 860: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.533289 700059 task_exit.go:204] [ 860: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.533309 700059 task_exit.go:204] [ 860: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.533319 700059 task_signals.go:204] [ 860: 863] Signal 860, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.533348 700059 task_exit.go:204] [ 860: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.533377 700059 task_exit.go:204] [ 860: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.533422 700059 task_exit.go:204] [ 860: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.535056 700059 task_exit.go:204] [ 860: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.535078 700059 task_exit.go:204] [ 860: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.535091 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.535116 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.535131 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.535398 700059 task_exit.go:204] [ 860: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.535593 700059 task_signals.go:470] [ 6: 12] Notified of signal 23 D0713 05:28:07.535784 700059 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 05:28:07.536334 700059 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.538007 700059 syscalls.go:262] [ 865: 865] Allocating stack with size of 8388608 bytes D0713 05:28:07.538145 700059 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.539401 700059 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.539441 700059 usertrap_amd64.go:106] [ 865: 865] Map a usertrap vma at 63000 D0713 05:28:07.539563 700059 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc002114420 1 D0713 05:28:07.539596 700059 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:07.539920 700059 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.539942 700059 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc002114420 2 D0713 05:28:07.539954 700059 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:07.540545 700059 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.540566 700059 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc002114420 3 D0713 05:28:07.540574 700059 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:07.548689 700059 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.548749 700059 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc002114420 4 D0713 05:28:07.548769 700059 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:07.550105 700059 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.550139 700059 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc002114420 5 D0713 05:28:07.550150 700059 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:07.550272 700059 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.550297 700059 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc002114420 6 D0713 05:28:07.550306 700059 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:07.550591 700059 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.550612 700059 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc002114420 7 D0713 05:28:07.550623 700059 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:07.550816 700059 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.550829 700059 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc002114420 8 D0713 05:28:07.550842 700059 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:07.551142 700059 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.551180 700059 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc002114420 9 D0713 05:28:07.551197 700059 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:07.551223 700059 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.551241 700059 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc002114420 10 D0713 05:28:07.551252 700059 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:07.558894 700059 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.558930 700059 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc002114420 11 D0713 05:28:07.558946 700059 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:07.561901 700059 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.561936 700059 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc002114420 12 D0713 05:28:07.561953 700059 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:07.562027 700059 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.562044 700059 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc002114420 13 D0713 05:28:07.562055 700059 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:07.562094 700059 task_signals.go:470] [ 865: 865] Notified of signal 23 D0713 05:28:07.562136 700059 task_signals.go:220] [ 865: 865] Signal 23: delivering to handler D0713 05:28:07.571005 700059 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.571041 700059 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc002114420 14 D0713 05:28:07.571060 700059 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:07.571116 700059 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.571137 700059 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.571163 700059 task_signals.go:204] [ 865: 868] Signal 865, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.571161 700059 task_signals.go:204] [ 865: 867] Signal 865, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.571184 700059 task_signals.go:204] [ 865: 866] Signal 865, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.571197 700059 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.571212 700059 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.571220 700059 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.571182 700059 task_signals.go:204] [ 865: 869] Signal 865, PID: 869, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.571235 700059 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.571240 700059 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.571245 700059 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.571252 700059 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.571258 700059 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.571262 700059 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.571271 700059 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.572541 700059 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.572554 700059 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.572567 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.572591 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.572598 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.572790 700059 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.573459 700059 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.574807 700059 syscalls.go:262] [ 870: 870] Allocating stack with size of 8388608 bytes D0713 05:28:07.574899 700059 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.576363 700059 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.576406 700059 usertrap_amd64.go:106] [ 870: 870] Map a usertrap vma at 6a000 D0713 05:28:07.577044 700059 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc002114900 1 D0713 05:28:07.577089 700059 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:07.577533 700059 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.577559 700059 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc002114900 2 D0713 05:28:07.577573 700059 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:07.578527 700059 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.578563 700059 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc002114900 3 D0713 05:28:07.578576 700059 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:07.590368 700059 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.590422 700059 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc002114900 4 D0713 05:28:07.590440 700059 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:07.592024 700059 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.592075 700059 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc002114900 5 D0713 05:28:07.592086 700059 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:07.592143 700059 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.592152 700059 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc002114900 6 D0713 05:28:07.592159 700059 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:07.592748 700059 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.592765 700059 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc002114900 7 D0713 05:28:07.592771 700059 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:07.592936 700059 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.593002 700059 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc002114900 8 D0713 05:28:07.593016 700059 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:07.593185 700059 usertrap_amd64.go:212] [ 870: 872] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:07.593210 700059 usertrap_amd64.go:122] [ 870: 872] Allocate a new trap: 0xc002114900 9 D0713 05:28:07.593222 700059 usertrap_amd64.go:225] [ 870: 872] Apply the binary patch addr 46b6e0 trap addr 6a2d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:07.593260 700059 usertrap_amd64.go:212] [ 870: 872] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.593278 700059 usertrap_amd64.go:122] [ 870: 872] Allocate a new trap: 0xc002114900 10 D0713 05:28:07.593288 700059 usertrap_amd64.go:225] [ 870: 872] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:07.593372 700059 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.593414 700059 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc002114900 11 D0713 05:28:07.593435 700059 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46af76 trap addr 6a370 ([184 35 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:07.603905 700059 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.603956 700059 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc002114900 12 D0713 05:28:07.603974 700059 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:07.604012 700059 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.604022 700059 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc002114900 13 D0713 05:28:07.604031 700059 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:07.604089 700059 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.604100 700059 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc002114900 14 D0713 05:28:07.604108 700059 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:07.604132 700059 task_signals.go:470] [ 870: 870] Notified of signal 23 D0713 05:28:07.604189 700059 task_signals.go:220] [ 870: 870] Signal 23: delivering to handler D0713 05:28:07.604319 700059 task_signals.go:470] [ 870: 870] Notified of signal 23 D0713 05:28:07.604351 700059 task_signals.go:220] [ 870: 870] Signal 23: delivering to handler D0713 05:28:07.614791 700059 task_signals.go:470] [ 870: 870] Notified of signal 23 D0713 05:28:07.614881 700059 task_signals.go:220] [ 870: 870] Signal 23: delivering to handler D0713 05:28:07.625463 700059 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.625523 700059 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc002114900 15 D0713 05:28:07.625545 700059 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 05:28:07.625653 700059 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.625690 700059 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.625722 700059 task_signals.go:204] [ 870: 873] Signal 870, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.625742 700059 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.625712 700059 task_signals.go:204] [ 870: 872] Signal 870, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.625751 700059 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.625767 700059 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.625822 700059 task_signals.go:204] [ 870: 871] Signal 870, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.625856 700059 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.625940 700059 task_signals.go:204] [ 870: 874] Signal 870, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.625972 700059 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.625979 700059 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.625997 700059 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.626016 700059 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.626021 700059 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.626032 700059 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.627702 700059 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.627739 700059 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.627759 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.627827 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.627882 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.627965 700059 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.628623 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.629950 700059 syscalls.go:262] [ 875: 875] Allocating stack with size of 8388608 bytes D0713 05:28:07.630060 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.631814 700059 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.631874 700059 usertrap_amd64.go:106] [ 875: 875] Map a usertrap vma at 66000 D0713 05:28:07.632005 700059 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0021150b0 1 D0713 05:28:07.632054 700059 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:07.632328 700059 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.632356 700059 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0021150b0 2 D0713 05:28:07.632367 700059 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:07.632872 700059 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.632896 700059 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0021150b0 3 D0713 05:28:07.632909 700059 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:07.640489 700059 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.640508 700059 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0021150b0 4 D0713 05:28:07.640537 700059 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:07.641931 700059 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.641964 700059 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0021150b0 5 D0713 05:28:07.641977 700059 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:07.642027 700059 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.642041 700059 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0021150b0 6 D0713 05:28:07.642050 700059 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:07.642267 700059 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.642297 700059 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0021150b0 7 D0713 05:28:07.642307 700059 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:07.642529 700059 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.642563 700059 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0021150b0 8 D0713 05:28:07.642582 700059 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:07.642781 700059 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.642806 700059 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0021150b0 9 D0713 05:28:07.642816 700059 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:07.642878 700059 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.642895 700059 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0021150b0 10 D0713 05:28:07.642913 700059 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:07.652623 700059 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.652662 700059 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0021150b0 11 D0713 05:28:07.652694 700059 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:07.655792 700059 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.655824 700059 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0021150b0 12 D0713 05:28:07.655839 700059 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:07.655995 700059 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.656021 700059 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0021150b0 13 D0713 05:28:07.656034 700059 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:07.656078 700059 task_signals.go:470] [ 875: 875] Notified of signal 23 D0713 05:28:07.656141 700059 task_signals.go:220] [ 875: 875] Signal 23: delivering to handler D0713 05:28:07.666666 700059 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.666701 700059 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0021150b0 14 D0713 05:28:07.666715 700059 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:07.666789 700059 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.666811 700059 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.666836 700059 task_signals.go:204] [ 875: 878] Signal 875, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.666866 700059 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.666952 700059 task_signals.go:204] [ 875: 879] Signal 875, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.666982 700059 task_signals.go:204] [ 875: 877] Signal 875, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.666990 700059 task_signals.go:204] [ 875: 876] Signal 875, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.667016 700059 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.667041 700059 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.667049 700059 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.667068 700059 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.667089 700059 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.667120 700059 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.667217 700059 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.667238 700059 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.667295 700059 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.668863 700059 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.668902 700059 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.668922 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.669038 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.669079 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.669151 700059 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.669775 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.671395 700059 syscalls.go:262] [ 880: 880] Allocating stack with size of 8388608 bytes D0713 05:28:07.671499 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.672987 700059 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.673041 700059 usertrap_amd64.go:106] [ 880: 880] Map a usertrap vma at 65000 D0713 05:28:07.673186 700059 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002115260 1 D0713 05:28:07.673220 700059 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:07.673532 700059 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.673559 700059 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002115260 2 D0713 05:28:07.673573 700059 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:07.674340 700059 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.674380 700059 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002115260 3 D0713 05:28:07.674398 700059 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:07.679504 700059 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.679557 700059 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002115260 4 D0713 05:28:07.679572 700059 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:07.680740 700059 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.680793 700059 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002115260 5 D0713 05:28:07.680811 700059 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:07.680865 700059 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.680888 700059 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002115260 6 D0713 05:28:07.680899 700059 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:07.681522 700059 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.681555 700059 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002115260 7 D0713 05:28:07.681568 700059 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:07.681798 700059 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.681845 700059 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc002115260 8 D0713 05:28:07.681856 700059 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:07.681982 700059 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.682008 700059 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc002115260 9 D0713 05:28:07.682020 700059 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:07.682044 700059 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.682069 700059 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002115260 10 D0713 05:28:07.682084 700059 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:07.682935 700059 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.682961 700059 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc002115260 11 D0713 05:28:07.682973 700059 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:07.683010 700059 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.683029 700059 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc002115260 12 D0713 05:28:07.683042 700059 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:07.683097 700059 task_signals.go:470] [ 880: 880] Notified of signal 23 D0713 05:28:07.683199 700059 task_signals.go:220] [ 880: 880] Signal 23: delivering to handler D0713 05:28:07.690120 700059 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.690137 700059 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002115260 13 D0713 05:28:07.690147 700059 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:07.693638 700059 task_signals.go:470] [ 880: 880] Notified of signal 23 D0713 05:28:07.693700 700059 task_signals.go:220] [ 880: 880] Signal 23: delivering to handler D0713 05:28:07.699839 700059 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.699873 700059 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002115260 14 D0713 05:28:07.699885 700059 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:07.699945 700059 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.699966 700059 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.699968 700059 task_signals.go:204] [ 880: 882] Signal 880, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.699990 700059 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.700009 700059 task_signals.go:204] [ 880: 883] Signal 880, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.700010 700059 task_signals.go:204] [ 880: 884] Signal 880, PID: 884, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.700036 700059 task_signals.go:204] [ 880: 881] Signal 880, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.700047 700059 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.700053 700059 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.700064 700059 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.700070 700059 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.700074 700059 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.700067 700059 task_signals.go:204] [ 880: 885] Signal 880, PID: 885, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.700082 700059 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.700158 700059 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.700196 700059 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.700221 700059 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.700232 700059 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.700240 700059 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.700251 700059 task_exit.go:204] [ 880: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.701295 700059 task_exit.go:204] [ 880: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.701320 700059 task_exit.go:204] [ 880: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.701333 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.704489 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.704514 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.704653 700059 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.705053 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.706073 700059 syscalls.go:262] [ 886: 886] Allocating stack with size of 8388608 bytes D0713 05:28:07.706161 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.706906 700059 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.706930 700059 usertrap_amd64.go:106] [ 886: 886] Map a usertrap vma at 62000 D0713 05:28:07.706993 700059 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc001ed1890 1 D0713 05:28:07.707021 700059 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:07.707258 700059 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.707274 700059 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc001ed1890 2 D0713 05:28:07.707280 700059 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:07.707712 700059 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.707731 700059 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc001ed1890 3 D0713 05:28:07.707737 700059 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:07.712311 700059 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.712342 700059 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc001ed1890 4 D0713 05:28:07.712354 700059 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:07.713696 700059 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.713724 700059 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc001ed1890 5 D0713 05:28:07.713734 700059 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:07.713761 700059 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.713765 700059 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc001ed1890 6 D0713 05:28:07.713771 700059 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:07.713939 700059 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.713956 700059 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc001ed1890 7 D0713 05:28:07.713962 700059 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:07.714027 700059 usertrap_amd64.go:212] [ 886: 887] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.714045 700059 usertrap_amd64.go:122] [ 886: 887] Allocate a new trap: 0xc001ed1890 8 D0713 05:28:07.714051 700059 usertrap_amd64.go:225] [ 886: 887] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:07.714167 700059 usertrap_amd64.go:212] [ 886: 887] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.714174 700059 usertrap_amd64.go:122] [ 886: 887] Allocate a new trap: 0xc001ed1890 9 D0713 05:28:07.714180 700059 usertrap_amd64.go:225] [ 886: 887] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:07.714193 700059 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.714198 700059 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc001ed1890 10 D0713 05:28:07.714204 700059 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:07.721959 700059 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.721989 700059 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc001ed1890 11 D0713 05:28:07.722002 700059 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:07.725190 700059 usertrap_amd64.go:212] [ 886: 887] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.725225 700059 usertrap_amd64.go:122] [ 886: 887] Allocate a new trap: 0xc001ed1890 12 D0713 05:28:07.725237 700059 usertrap_amd64.go:225] [ 886: 887] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:07.725329 700059 usertrap_amd64.go:212] [ 886: 887] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.725376 700059 usertrap_amd64.go:122] [ 886: 887] Allocate a new trap: 0xc001ed1890 13 D0713 05:28:07.725395 700059 usertrap_amd64.go:225] [ 886: 887] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:07.725454 700059 task_signals.go:470] [ 886: 886] Notified of signal 23 D0713 05:28:07.725534 700059 task_signals.go:220] [ 886: 886] Signal 23: delivering to handler D0713 05:28:07.731605 700059 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.731640 700059 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc001ed1890 14 D0713 05:28:07.731659 700059 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:07.731722 700059 task_exit.go:204] [ 886: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.731752 700059 task_exit.go:204] [ 886: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.731756 700059 task_signals.go:204] [ 886: 887] Signal 886, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.731776 700059 task_signals.go:204] [ 886: 890] Signal 886, PID: 890, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.731783 700059 task_exit.go:204] [ 886: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.731795 700059 task_exit.go:204] [ 886: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.731800 700059 task_exit.go:204] [ 886: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.731810 700059 task_exit.go:204] [ 886: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.731830 700059 task_exit.go:204] [ 886: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.731838 700059 task_exit.go:204] [ 886: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.731789 700059 task_signals.go:204] [ 886: 889] Signal 886, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.731907 700059 task_exit.go:204] [ 886: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.731969 700059 task_exit.go:204] [ 886: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.731977 700059 task_exit.go:204] [ 886: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.731857 700059 task_signals.go:204] [ 886: 888] Signal 886, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.732014 700059 task_exit.go:204] [ 886: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.733242 700059 task_exit.go:204] [ 886: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.733284 700059 task_exit.go:204] [ 886: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.733304 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.733336 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.733345 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.733416 700059 task_exit.go:204] [ 886: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.734088 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.735531 700059 syscalls.go:262] [ 891: 891] Allocating stack with size of 8388608 bytes D0713 05:28:07.735620 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.736786 700059 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.736842 700059 usertrap_amd64.go:106] [ 891: 891] Map a usertrap vma at 63000 D0713 05:28:07.736985 700059 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc001ed1a10 1 D0713 05:28:07.737031 700059 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:07.737744 700059 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.737768 700059 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc001ed1a10 2 D0713 05:28:07.737778 700059 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:07.738627 700059 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.738659 700059 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc001ed1a10 3 D0713 05:28:07.738672 700059 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:07.745173 700059 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.745267 700059 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc001ed1a10 4 D0713 05:28:07.745295 700059 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:07.746874 700059 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.746919 700059 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc001ed1a10 5 D0713 05:28:07.746939 700059 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:07.746988 700059 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.746994 700059 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc001ed1a10 6 D0713 05:28:07.747003 700059 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:07.747527 700059 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.747556 700059 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc001ed1a10 7 D0713 05:28:07.747567 700059 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:07.747778 700059 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.747808 700059 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc001ed1a10 8 D0713 05:28:07.747821 700059 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:07.748067 700059 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.748094 700059 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc001ed1a10 9 D0713 05:28:07.748106 700059 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:07.748221 700059 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.748238 700059 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc001ed1a10 10 D0713 05:28:07.748250 700059 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:07.748304 700059 usertrap_amd64.go:212] [ 891: 894] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:07.748318 700059 usertrap_amd64.go:122] [ 891: 894] Allocate a new trap: 0xc001ed1a10 11 D0713 05:28:07.748329 700059 usertrap_amd64.go:225] [ 891: 894] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:07.755367 700059 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.755395 700059 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc001ed1a10 12 D0713 05:28:07.755418 700059 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:07.758561 700059 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.758586 700059 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc001ed1a10 13 D0713 05:28:07.758602 700059 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:07.758696 700059 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.758751 700059 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc001ed1a10 14 D0713 05:28:07.758770 700059 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:07.758820 700059 task_signals.go:470] [ 891: 891] Notified of signal 23 D0713 05:28:07.758906 700059 task_signals.go:220] [ 891: 891] Signal 23: delivering to handler D0713 05:28:07.766735 700059 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.766771 700059 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc001ed1a10 15 D0713 05:28:07.766786 700059 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 05:28:07.766835 700059 task_exit.go:204] [ 891: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.766858 700059 task_exit.go:204] [ 891: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.766880 700059 task_signals.go:204] [ 891: 894] Signal 891, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.766876 700059 task_signals.go:204] [ 891: 893] Signal 891, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.766905 700059 task_exit.go:204] [ 891: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.766914 700059 task_exit.go:204] [ 891: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.766905 700059 task_signals.go:204] [ 891: 892] Signal 891, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.766921 700059 task_exit.go:204] [ 891: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.766948 700059 task_signals.go:204] [ 891: 895] Signal 891, PID: 895, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.766973 700059 task_exit.go:204] [ 891: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.766987 700059 task_signals.go:204] [ 891: 896] Signal 891, PID: 896, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.767002 700059 task_exit.go:204] [ 891: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.767007 700059 task_exit.go:204] [ 891: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.767015 700059 task_exit.go:204] [ 891: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.767032 700059 task_exit.go:204] [ 891: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.767036 700059 task_exit.go:204] [ 891: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.767044 700059 task_exit.go:204] [ 891: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.767050 700059 task_exit.go:204] [ 891: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.767054 700059 task_exit.go:204] [ 891: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.767061 700059 task_exit.go:204] [ 891: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.767989 700059 task_exit.go:204] [ 891: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.768013 700059 task_exit.go:204] [ 891: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.768028 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.768063 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.768081 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.768172 700059 task_exit.go:204] [ 891: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.768844 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.770571 700059 syscalls.go:262] [ 897: 897] Allocating stack with size of 8388608 bytes D0713 05:28:07.770685 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.771332 700059 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.771378 700059 usertrap_amd64.go:106] [ 897: 897] Map a usertrap vma at 68000 D0713 05:28:07.771691 700059 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc000c4b7a0 1 D0713 05:28:07.771724 700059 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:07.772064 700059 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.772108 700059 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc000c4b7a0 2 D0713 05:28:07.772117 700059 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:07.773330 700059 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.773354 700059 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc000c4b7a0 3 D0713 05:28:07.773376 700059 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:07.778950 700059 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.778979 700059 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc000c4b7a0 4 D0713 05:28:07.778991 700059 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:07.780189 700059 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.780243 700059 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc000c4b7a0 5 D0713 05:28:07.780264 700059 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:07.780329 700059 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.780350 700059 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc000c4b7a0 6 D0713 05:28:07.780373 700059 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:07.780736 700059 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.780765 700059 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc000c4b7a0 7 D0713 05:28:07.780777 700059 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:07.781114 700059 usertrap_amd64.go:212] [ 897: 898] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.781151 700059 usertrap_amd64.go:122] [ 897: 898] Allocate a new trap: 0xc000c4b7a0 8 D0713 05:28:07.781164 700059 usertrap_amd64.go:225] [ 897: 898] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:07.781461 700059 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.781491 700059 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc000c4b7a0 9 D0713 05:28:07.781506 700059 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:07.781612 700059 usertrap_amd64.go:212] [ 897: 898] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.781635 700059 usertrap_amd64.go:122] [ 897: 898] Allocate a new trap: 0xc000c4b7a0 10 D0713 05:28:07.781648 700059 usertrap_amd64.go:225] [ 897: 898] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:07.790002 700059 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.790030 700059 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc000c4b7a0 11 D0713 05:28:07.790041 700059 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:07.792375 700059 usertrap_amd64.go:212] [ 897: 898] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.792407 700059 usertrap_amd64.go:122] [ 897: 898] Allocate a new trap: 0xc000c4b7a0 12 D0713 05:28:07.792426 700059 usertrap_amd64.go:225] [ 897: 898] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:07.792459 700059 usertrap_amd64.go:212] [ 897: 898] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.792467 700059 usertrap_amd64.go:122] [ 897: 898] Allocate a new trap: 0xc000c4b7a0 13 D0713 05:28:07.792474 700059 usertrap_amd64.go:225] [ 897: 898] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:07.792521 700059 task_signals.go:470] [ 897: 897] Notified of signal 23 D0713 05:28:07.792638 700059 task_signals.go:220] [ 897: 897] Signal 23: delivering to handler D0713 05:28:07.801809 700059 usertrap_amd64.go:212] [ 897: 897] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.801842 700059 usertrap_amd64.go:122] [ 897: 897] Allocate a new trap: 0xc000c4b7a0 14 D0713 05:28:07.801854 700059 usertrap_amd64.go:225] [ 897: 897] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:07.801925 700059 task_exit.go:204] [ 897: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.801952 700059 task_exit.go:204] [ 897: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.801972 700059 task_signals.go:204] [ 897: 901] Signal 897, PID: 901, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.801967 700059 task_signals.go:204] [ 897: 900] Signal 897, PID: 900, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.801990 700059 task_exit.go:204] [ 897: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.801997 700059 task_signals.go:204] [ 897: 898] Signal 897, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.802015 700059 task_signals.go:204] [ 897: 899] Signal 897, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.802023 700059 task_exit.go:204] [ 897: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.802028 700059 task_exit.go:204] [ 897: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.802039 700059 task_exit.go:204] [ 897: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.802052 700059 task_exit.go:204] [ 897: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.802055 700059 task_exit.go:204] [ 897: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.802062 700059 task_exit.go:204] [ 897: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.802068 700059 task_exit.go:204] [ 897: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.802073 700059 task_exit.go:204] [ 897: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.802080 700059 task_exit.go:204] [ 897: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.803123 700059 task_exit.go:204] [ 897: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.803159 700059 task_exit.go:204] [ 897: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.803178 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.803207 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.803306 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.803333 700059 task_exit.go:204] [ 897: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.803413 700059 task_signals.go:470] [ 6: 8] Notified of signal 23 D0713 05:28:07.803588 700059 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0713 05:28:07.804186 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.805424 700059 syscalls.go:262] [ 902: 902] Allocating stack with size of 8388608 bytes D0713 05:28:07.805510 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.806477 700059 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.806512 700059 usertrap_amd64.go:106] [ 902: 902] Map a usertrap vma at 63000 D0713 05:28:07.806700 700059 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000c4b920 1 D0713 05:28:07.806735 700059 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:07.806977 700059 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.807000 700059 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000c4b920 2 D0713 05:28:07.807008 700059 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:07.807608 700059 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.807622 700059 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000c4b920 3 D0713 05:28:07.807632 700059 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:07.813125 700059 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.813152 700059 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000c4b920 4 D0713 05:28:07.813160 700059 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:07.814031 700059 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.814048 700059 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000c4b920 5 D0713 05:28:07.814061 700059 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:07.814117 700059 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.814132 700059 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000c4b920 6 D0713 05:28:07.814138 700059 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:07.814295 700059 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.814317 700059 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000c4b920 7 D0713 05:28:07.814323 700059 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:07.814406 700059 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.814423 700059 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc000c4b920 8 D0713 05:28:07.814435 700059 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:07.814566 700059 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.814591 700059 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000c4b920 9 D0713 05:28:07.814602 700059 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:07.814627 700059 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.814653 700059 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc000c4b920 10 D0713 05:28:07.814664 700059 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:07.814893 700059 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.814918 700059 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc000c4b920 11 D0713 05:28:07.814924 700059 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:07.814974 700059 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.814983 700059 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc000c4b920 12 D0713 05:28:07.814991 700059 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:07.815060 700059 task_signals.go:470] [ 902: 902] Notified of signal 23 D0713 05:28:07.815112 700059 task_signals.go:220] [ 902: 902] Signal 23: delivering to handler D0713 05:28:07.820625 700059 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.820646 700059 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000c4b920 13 D0713 05:28:07.820653 700059 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:07.825320 700059 task_signals.go:470] [ 902: 902] Notified of signal 23 D0713 05:28:07.826040 700059 task_signals.go:220] [ 902: 902] Signal 23: delivering to handler D0713 05:28:07.826172 700059 task_signals.go:470] [ 902: 902] Notified of signal 23 D0713 05:28:07.826283 700059 task_signals.go:220] [ 902: 902] Signal 23: delivering to handler D0713 05:28:07.831420 700059 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.831508 700059 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000c4b920 14 D0713 05:28:07.831535 700059 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:07.831574 700059 task_exit.go:204] [ 902: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.831589 700059 task_exit.go:204] [ 902: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.831609 700059 task_signals.go:204] [ 902: 905] Signal 902, PID: 905, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.831619 700059 task_exit.go:204] [ 902: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.831625 700059 task_exit.go:204] [ 902: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.831629 700059 task_exit.go:204] [ 902: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.831620 700059 task_signals.go:204] [ 902: 904] Signal 902, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.831641 700059 task_signals.go:204] [ 902: 906] Signal 902, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.831645 700059 task_exit.go:204] [ 902: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.831648 700059 task_signals.go:204] [ 902: 903] Signal 902, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.831657 700059 task_exit.go:204] [ 902: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.831672 700059 task_exit.go:204] [ 902: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.831702 700059 task_exit.go:204] [ 902: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.831714 700059 task_exit.go:204] [ 902: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.831719 700059 task_exit.go:204] [ 902: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.831731 700059 task_exit.go:204] [ 902: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.833232 700059 task_exit.go:204] [ 902: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.833338 700059 task_exit.go:204] [ 902: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.833377 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.833421 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.833513 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.833475 700059 task_exit.go:204] [ 902: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.834199 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.835264 700059 syscalls.go:262] [ 907: 907] Allocating stack with size of 8388608 bytes D0713 05:28:07.835365 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.837615 700059 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.837647 700059 usertrap_amd64.go:106] [ 907: 907] Map a usertrap vma at 64000 D0713 05:28:07.837739 700059 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc00139ae70 1 D0713 05:28:07.837764 700059 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:07.838094 700059 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.838119 700059 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc00139ae70 2 D0713 05:28:07.838131 700059 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:07.838556 700059 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.838583 700059 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc00139ae70 3 D0713 05:28:07.838592 700059 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:07.843830 700059 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.843883 700059 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc00139ae70 4 D0713 05:28:07.843907 700059 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:07.845071 700059 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.845102 700059 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc00139ae70 5 D0713 05:28:07.845113 700059 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:07.845763 700059 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.845792 700059 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc00139ae70 6 D0713 05:28:07.845803 700059 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:07.846053 700059 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.846074 700059 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc00139ae70 7 D0713 05:28:07.846082 700059 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:07.846273 700059 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.846288 700059 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc00139ae70 8 D0713 05:28:07.846299 700059 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:07.846541 700059 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.846560 700059 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc00139ae70 9 D0713 05:28:07.846572 700059 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:07.846608 700059 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.846686 700059 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc00139ae70 10 D0713 05:28:07.846703 700059 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:07.846790 700059 usertrap_amd64.go:212] [ 907: 910] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:07.846816 700059 usertrap_amd64.go:122] [ 907: 910] Allocate a new trap: 0xc00139ae70 11 D0713 05:28:07.846827 700059 usertrap_amd64.go:225] [ 907: 910] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:07.854967 700059 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.855011 700059 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc00139ae70 12 D0713 05:28:07.855027 700059 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:07.857825 700059 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.857873 700059 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc00139ae70 13 D0713 05:28:07.857890 700059 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:07.857931 700059 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.857976 700059 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc00139ae70 14 D0713 05:28:07.857995 700059 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:07.858057 700059 task_signals.go:470] [ 907: 907] Notified of signal 23 D0713 05:28:07.858153 700059 task_signals.go:220] [ 907: 907] Signal 23: delivering to handler D0713 05:28:07.866103 700059 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.866136 700059 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc00139ae70 15 D0713 05:28:07.866156 700059 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 05:28:07.866251 700059 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.866286 700059 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.866289 700059 task_signals.go:204] [ 907: 910] Signal 907, PID: 910, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.866354 700059 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.866377 700059 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.866385 700059 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.866347 700059 task_signals.go:204] [ 907: 908] Signal 907, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.866318 700059 task_signals.go:204] [ 907: 911] Signal 907, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.866403 700059 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.866418 700059 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.866423 700059 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.866334 700059 task_signals.go:204] [ 907: 909] Signal 907, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.866461 700059 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.866490 700059 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.866499 700059 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.866517 700059 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.867636 700059 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.867674 700059 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.867691 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.867756 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.867776 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.867855 700059 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.868467 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.869875 700059 syscalls.go:262] [ 912: 912] Allocating stack with size of 8388608 bytes D0713 05:28:07.869976 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.870742 700059 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.870892 700059 usertrap_amd64.go:106] [ 912: 912] Map a usertrap vma at 6a000 D0713 05:28:07.871260 700059 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc000686c00 1 D0713 05:28:07.871370 700059 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:07.872104 700059 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.872186 700059 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc000686c00 2 D0713 05:28:07.872239 700059 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:07.873146 700059 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.873216 700059 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc000686c00 3 D0713 05:28:07.873240 700059 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:07.885870 700059 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.885925 700059 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc000686c00 4 D0713 05:28:07.885944 700059 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:07.887427 700059 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.887468 700059 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc000686c00 5 D0713 05:28:07.887485 700059 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:07.887556 700059 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.887565 700059 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc000686c00 6 D0713 05:28:07.887576 700059 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:07.888132 700059 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.888184 700059 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc000686c00 7 D0713 05:28:07.888202 700059 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:07.888434 700059 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.888476 700059 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc000686c00 8 D0713 05:28:07.888494 700059 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:07.888832 700059 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.888861 700059 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc000686c00 9 D0713 05:28:07.888879 700059 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:07.889058 700059 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.889091 700059 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc000686c00 10 D0713 05:28:07.889228 700059 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:07.898450 700059 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.898493 700059 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc000686c00 11 D0713 05:28:07.898510 700059 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:07.901309 700059 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.901344 700059 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc000686c00 12 D0713 05:28:07.901360 700059 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:07.901436 700059 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.901455 700059 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc000686c00 13 D0713 05:28:07.901462 700059 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:07.901482 700059 task_signals.go:470] [ 912: 912] Notified of signal 23 D0713 05:28:07.901546 700059 task_signals.go:220] [ 912: 912] Signal 23: delivering to handler D0713 05:28:07.909702 700059 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.909740 700059 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc000686c00 14 D0713 05:28:07.909763 700059 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:07.909801 700059 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.909825 700059 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.909854 700059 task_signals.go:204] [ 912: 915] Signal 912, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.909872 700059 task_signals.go:204] [ 912: 916] Signal 912, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.909885 700059 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.909880 700059 task_signals.go:204] [ 912: 913] Signal 912, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.909917 700059 task_signals.go:204] [ 912: 914] Signal 912, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.909932 700059 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.909951 700059 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.909974 700059 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.910021 700059 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.910031 700059 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.910052 700059 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.910064 700059 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.910071 700059 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.910084 700059 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.911526 700059 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.911560 700059 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.911580 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.911630 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.911663 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.911759 700059 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.912517 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.914087 700059 syscalls.go:262] [ 917: 917] Allocating stack with size of 8388608 bytes D0713 05:28:07.914225 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.915397 700059 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.915438 700059 usertrap_amd64.go:106] [ 917: 917] Map a usertrap vma at 62000 D0713 05:28:07.915529 700059 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc001ac42d0 1 D0713 05:28:07.915561 700059 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:07.916002 700059 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.916030 700059 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc001ac42d0 2 D0713 05:28:07.916043 700059 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:07.916864 700059 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.916894 700059 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc001ac42d0 3 D0713 05:28:07.916909 700059 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:07.924215 700059 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.924249 700059 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc001ac42d0 4 D0713 05:28:07.924264 700059 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:07.925614 700059 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.925642 700059 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc001ac42d0 5 D0713 05:28:07.925655 700059 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:07.925712 700059 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.925721 700059 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc001ac42d0 6 D0713 05:28:07.925730 700059 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:07.926327 700059 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.926339 700059 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc001ac42d0 7 D0713 05:28:07.926349 700059 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:07.926519 700059 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.926586 700059 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc001ac42d0 8 D0713 05:28:07.926605 700059 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:07.926748 700059 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.926802 700059 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc001ac42d0 9 D0713 05:28:07.926816 700059 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:07.926967 700059 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.927001 700059 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc001ac42d0 10 D0713 05:28:07.927017 700059 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:07.927174 700059 usertrap_amd64.go:212] [ 917: 920] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:07.927256 700059 usertrap_amd64.go:122] [ 917: 920] Allocate a new trap: 0xc001ac42d0 11 D0713 05:28:07.927277 700059 usertrap_amd64.go:225] [ 917: 920] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:07.927890 700059 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.927910 700059 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc001ac42d0 12 D0713 05:28:07.927923 700059 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:07.927980 700059 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.928006 700059 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc001ac42d0 13 D0713 05:28:07.928015 700059 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:07.928035 700059 task_signals.go:470] [ 917: 917] Notified of signal 23 D0713 05:28:07.928080 700059 task_signals.go:220] [ 917: 917] Signal 23: delivering to handler D0713 05:28:07.935382 700059 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.935418 700059 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc001ac42d0 14 D0713 05:28:07.935430 700059 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46af29 trap addr 62460 ([184 37 1 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:07.940201 700059 task_signals.go:470] [ 917: 917] Notified of signal 23 D0713 05:28:07.940300 700059 task_signals.go:220] [ 917: 917] Signal 23: delivering to handler D0713 05:28:07.947879 700059 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.947918 700059 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc001ac42d0 15 D0713 05:28:07.947936 700059 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 05:28:07.948009 700059 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.948048 700059 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.948050 700059 task_signals.go:204] [ 917: 920] Signal 917, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.948072 700059 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.948072 700059 task_signals.go:204] [ 917: 921] Signal 917, PID: 921, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.948083 700059 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.948104 700059 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.948163 700059 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.948188 700059 task_signals.go:204] [ 917: 919] Signal 917, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.948160 700059 task_signals.go:204] [ 917: 918] Signal 917, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.948202 700059 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.948208 700059 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.948222 700059 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.948251 700059 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.948257 700059 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.948267 700059 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.949601 700059 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.949632 700059 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.949646 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.949713 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.949737 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.949935 700059 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.950649 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.951179 700059 task_signals.go:481] [ 6: 20] No task notified of signal 23 D0713 05:28:07.953259 700059 syscalls.go:262] [ 922: 922] Allocating stack with size of 8388608 bytes D0713 05:28:07.953429 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.953565 700059 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 05:28:07.953682 700059 task_signals.go:470] [ 6: 20] Notified of signal 23 D0713 05:28:07.953742 700059 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 05:28:07.954947 700059 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.954990 700059 usertrap_amd64.go:106] [ 922: 922] Map a usertrap vma at 66000 D0713 05:28:07.955110 700059 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001ac4690 1 D0713 05:28:07.955139 700059 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:07.955584 700059 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.955607 700059 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001ac4690 2 D0713 05:28:07.955619 700059 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:07.956247 700059 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.956284 700059 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001ac4690 3 D0713 05:28:07.956306 700059 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:07.964385 700059 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:07.964480 700059 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001ac4690 4 D0713 05:28:07.964502 700059 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:07.966096 700059 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:07.966124 700059 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001ac4690 5 D0713 05:28:07.966139 700059 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:07.966213 700059 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b214:sysno 13 D0713 05:28:07.966224 700059 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001ac4690 6 D0713 05:28:07.966234 700059 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:07.966709 700059 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:07.966721 700059 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001ac4690 7 D0713 05:28:07.966730 700059 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:07.966933 700059 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:07.966982 700059 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc001ac4690 8 D0713 05:28:07.967002 700059 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:07.967239 700059 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46af76:sysno 35 D0713 05:28:07.967265 700059 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc001ac4690 9 D0713 05:28:07.967279 700059 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:07.967512 700059 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:07.967554 700059 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001ac4690 10 D0713 05:28:07.967572 700059 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:07.976404 700059 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46af29:sysno 293 D0713 05:28:07.976484 700059 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001ac4690 11 D0713 05:28:07.976507 700059 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:07.977898 700059 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b020:sysno 39 D0713 05:28:07.977933 700059 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc001ac4690 12 D0713 05:28:07.977951 700059 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:07.979928 700059 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:07.979997 700059 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc001ac4690 13 D0713 05:28:07.980020 700059 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:07.980092 700059 task_signals.go:470] [ 922: 922] Notified of signal 23 D0713 05:28:07.980143 700059 task_signals.go:220] [ 922: 922] Signal 23: delivering to handler D0713 05:28:07.989526 700059 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:07.989555 700059 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc001ac4690 14 D0713 05:28:07.989569 700059 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:07.989701 700059 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.989782 700059 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.989820 700059 task_signals.go:204] [ 922: 923] Signal 922, PID: 923, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.989846 700059 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.989856 700059 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.989869 700059 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.989889 700059 task_signals.go:204] [ 922: 924] Signal 922, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.989910 700059 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.989921 700059 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.989927 700059 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.989970 700059 task_signals.go:204] [ 922: 925] Signal 922, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.989983 700059 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.989991 700059 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.989996 700059 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.990014 700059 task_signals.go:204] [ 922: 926] Signal 922, PID: 926, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:07.990027 700059 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:07.991492 700059 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:07.991531 700059 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.991549 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:07.992094 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:07.992139 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:07.992182 700059 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:07.992696 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.994422 700059 syscalls.go:262] [ 927: 927] Allocating stack with size of 8388608 bytes D0713 05:28:07.994541 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:07.996038 700059 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:07.996114 700059 usertrap_amd64.go:106] [ 927: 927] Map a usertrap vma at 69000 D0713 05:28:07.996247 700059 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001ac49f0 1 D0713 05:28:07.996290 700059 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:07.997047 700059 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:07.997089 700059 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001ac49f0 2 D0713 05:28:07.997107 700059 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:07.998322 700059 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:07.998375 700059 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001ac49f0 3 D0713 05:28:07.998396 700059 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:08.008253 700059 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.008308 700059 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001ac49f0 4 D0713 05:28:08.008325 700059 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:08.010186 700059 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.010259 700059 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001ac49f0 5 D0713 05:28:08.010273 700059 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:08.010350 700059 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.010357 700059 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001ac49f0 6 D0713 05:28:08.010363 700059 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:08.010842 700059 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.010866 700059 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001ac49f0 7 D0713 05:28:08.010874 700059 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:08.011182 700059 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.011215 700059 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc001ac49f0 8 D0713 05:28:08.011229 700059 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:08.011425 700059 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.011460 700059 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001ac49f0 9 D0713 05:28:08.011474 700059 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:08.011514 700059 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.011523 700059 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc001ac49f0 10 D0713 05:28:08.011534 700059 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:08.021335 700059 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.021384 700059 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001ac49f0 11 D0713 05:28:08.021400 700059 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:08.023585 700059 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.023625 700059 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc001ac49f0 12 D0713 05:28:08.023639 700059 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:08.023774 700059 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.023836 700059 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc001ac49f0 13 D0713 05:28:08.023880 700059 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:08.024422 700059 task_signals.go:470] [ 927: 927] Notified of signal 23 D0713 05:28:08.024514 700059 task_signals.go:220] [ 927: 927] Signal 23: delivering to handler D0713 05:28:08.030517 700059 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.030557 700059 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc001ac49f0 14 D0713 05:28:08.030572 700059 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:08.030627 700059 task_exit.go:204] [ 927: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.030649 700059 task_exit.go:204] [ 927: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.030672 700059 task_signals.go:204] [ 927: 930] Signal 927, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.030702 700059 task_signals.go:204] [ 927: 931] Signal 927, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.030697 700059 task_signals.go:204] [ 927: 929] Signal 927, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.030711 700059 task_exit.go:204] [ 927: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.030665 700059 task_signals.go:204] [ 927: 928] Signal 927, PID: 928, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.030733 700059 task_exit.go:204] [ 927: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.030683 700059 task_signals.go:204] [ 927: 932] Signal 927, PID: 932, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.030740 700059 task_exit.go:204] [ 927: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.030830 700059 task_exit.go:204] [ 927: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.030854 700059 task_exit.go:204] [ 927: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.030860 700059 task_exit.go:204] [ 927: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.030878 700059 task_exit.go:204] [ 927: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.030888 700059 task_exit.go:204] [ 927: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.030895 700059 task_exit.go:204] [ 927: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.030923 700059 task_exit.go:204] [ 927: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.030939 700059 task_exit.go:204] [ 927: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.030944 700059 task_exit.go:204] [ 927: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.030963 700059 task_exit.go:204] [ 927: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.031886 700059 task_exit.go:204] [ 927: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.031925 700059 task_exit.go:204] [ 927: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.031942 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.031980 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.032002 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.032037 700059 task_exit.go:204] [ 927: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.032171 700059 task_signals.go:470] [ 6: 8] Notified of signal 23 D0713 05:28:08.032220 700059 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0713 05:28:08.032596 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.034087 700059 syscalls.go:262] [ 933: 933] Allocating stack with size of 8388608 bytes D0713 05:28:08.034181 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.034499 700059 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.034549 700059 usertrap_amd64.go:106] [ 933: 933] Map a usertrap vma at 63000 D0713 05:28:08.034598 700059 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc00139b4a0 1 D0713 05:28:08.034613 700059 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:08.035238 700059 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.035257 700059 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc00139b4a0 2 D0713 05:28:08.035264 700059 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:08.035549 700059 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.035569 700059 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc00139b4a0 3 D0713 05:28:08.035575 700059 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:08.039801 700059 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.039825 700059 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc00139b4a0 4 D0713 05:28:08.039833 700059 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:08.040837 700059 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.040865 700059 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc00139b4a0 5 D0713 05:28:08.040874 700059 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:08.040915 700059 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.040928 700059 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc00139b4a0 6 D0713 05:28:08.040933 700059 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:08.041205 700059 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.041223 700059 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc00139b4a0 7 D0713 05:28:08.041229 700059 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:08.041310 700059 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.041321 700059 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc00139b4a0 8 D0713 05:28:08.041331 700059 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:08.041429 700059 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.041706 700059 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc00139b4a0 9 D0713 05:28:08.041732 700059 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:08.041765 700059 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.041773 700059 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc00139b4a0 10 D0713 05:28:08.041781 700059 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:08.048597 700059 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.048627 700059 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc00139b4a0 11 D0713 05:28:08.048639 700059 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:08.052436 700059 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.052478 700059 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc00139b4a0 12 D0713 05:28:08.052493 700059 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:08.052557 700059 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.052612 700059 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc00139b4a0 13 D0713 05:28:08.052634 700059 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:08.053032 700059 task_signals.go:470] [ 933: 933] Notified of signal 23 D0713 05:28:08.053094 700059 task_signals.go:220] [ 933: 933] Signal 23: delivering to handler D0713 05:28:08.057873 700059 sampler.go:191] Time: Adjusting syscall overhead down to 875 I0713 05:28:08.058780 700059 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0713 05:28:08.058836 700059 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.058851 700059 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc00139b4a0 14 D0713 05:28:08.058871 700059 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:08.058985 700059 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.059016 700059 task_signals.go:204] [ 933: 936] Signal 933, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.059049 700059 task_signals.go:204] [ 933: 934] Signal 933, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.059065 700059 task_signals.go:204] [ 933: 938] Signal 933, PID: 938, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.059080 700059 task_signals.go:204] [ 933: 937] Signal 933, PID: 937, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.059091 700059 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.059119 700059 task_signals.go:204] [ 933: 935] Signal 933, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.059131 700059 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.059141 700059 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.059146 700059 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.059161 700059 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.059168 700059 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.059173 700059 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.059183 700059 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.059190 700059 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.059198 700059 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.059206 700059 task_exit.go:204] [ 933: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.059213 700059 task_exit.go:204] [ 933: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.059219 700059 task_exit.go:204] [ 933: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.059229 700059 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.060203 700059 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.060244 700059 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.060261 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.060363 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.060378 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.060462 700059 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.061195 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.062581 700059 syscalls.go:262] [ 939: 939] Allocating stack with size of 8388608 bytes D0713 05:28:08.062690 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.063986 700059 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.064033 700059 usertrap_amd64.go:106] [ 939: 939] Map a usertrap vma at 63000 D0713 05:28:08.064139 700059 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc0015ac5a0 1 D0713 05:28:08.064176 700059 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:08.064688 700059 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.064715 700059 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc0015ac5a0 2 D0713 05:28:08.064725 700059 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:08.065681 700059 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.065711 700059 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc0015ac5a0 3 D0713 05:28:08.065722 700059 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:08.074595 700059 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.074634 700059 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc0015ac5a0 4 D0713 05:28:08.074652 700059 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:08.076398 700059 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.076548 700059 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc0015ac5a0 5 D0713 05:28:08.076579 700059 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:08.076652 700059 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.076671 700059 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc0015ac5a0 6 D0713 05:28:08.076681 700059 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:08.077028 700059 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.077140 700059 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc0015ac5a0 7 D0713 05:28:08.077164 700059 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:08.077411 700059 usertrap_amd64.go:212] [ 939: 940] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.077453 700059 usertrap_amd64.go:122] [ 939: 940] Allocate a new trap: 0xc0015ac5a0 8 D0713 05:28:08.077466 700059 usertrap_amd64.go:225] [ 939: 940] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:08.077649 700059 usertrap_amd64.go:212] [ 939: 940] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.077677 700059 usertrap_amd64.go:122] [ 939: 940] Allocate a new trap: 0xc0015ac5a0 9 D0713 05:28:08.077690 700059 usertrap_amd64.go:225] [ 939: 940] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:08.077769 700059 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.077794 700059 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc0015ac5a0 10 D0713 05:28:08.077808 700059 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:08.086637 700059 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.086673 700059 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc0015ac5a0 11 D0713 05:28:08.086685 700059 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:08.089017 700059 usertrap_amd64.go:212] [ 939: 940] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.089056 700059 usertrap_amd64.go:122] [ 939: 940] Allocate a new trap: 0xc0015ac5a0 12 D0713 05:28:08.089069 700059 usertrap_amd64.go:225] [ 939: 940] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:08.089113 700059 usertrap_amd64.go:212] [ 939: 940] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.089124 700059 usertrap_amd64.go:122] [ 939: 940] Allocate a new trap: 0xc0015ac5a0 13 D0713 05:28:08.089135 700059 usertrap_amd64.go:225] [ 939: 940] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:08.089153 700059 task_signals.go:470] [ 939: 939] Notified of signal 23 D0713 05:28:08.089252 700059 task_signals.go:220] [ 939: 939] Signal 23: delivering to handler D0713 05:28:08.096742 700059 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.096772 700059 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc0015ac5a0 14 D0713 05:28:08.096781 700059 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:08.096849 700059 task_exit.go:204] [ 939: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.096871 700059 task_exit.go:204] [ 939: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.096914 700059 task_signals.go:204] [ 939: 941] Signal 939, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.096912 700059 task_signals.go:204] [ 939: 943] Signal 939, PID: 943, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.096935 700059 task_signals.go:204] [ 939: 942] Signal 939, PID: 942, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.096990 700059 task_exit.go:204] [ 939: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.097012 700059 task_signals.go:204] [ 939: 940] Signal 939, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.097027 700059 task_exit.go:204] [ 939: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.097036 700059 task_exit.go:204] [ 939: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.097067 700059 task_exit.go:204] [ 939: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.097100 700059 task_exit.go:204] [ 939: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.097107 700059 task_exit.go:204] [ 939: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.097117 700059 task_exit.go:204] [ 939: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.097123 700059 task_exit.go:204] [ 939: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.097128 700059 task_exit.go:204] [ 939: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.097138 700059 task_exit.go:204] [ 939: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.098262 700059 task_exit.go:204] [ 939: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.098291 700059 task_exit.go:204] [ 939: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.098312 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.098362 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.098391 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.098628 700059 task_exit.go:204] [ 939: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.107435 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.108617 700059 syscalls.go:262] [ 944: 944] Allocating stack with size of 8388608 bytes D0713 05:28:08.108715 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.108842 700059 task_signals.go:470] [ 6: 20] Notified of signal 23 D0713 05:28:08.108875 700059 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 05:28:08.109527 700059 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.109563 700059 usertrap_amd64.go:106] [ 944: 944] Map a usertrap vma at 68000 D0713 05:28:08.109665 700059 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc001ac4f60 1 D0713 05:28:08.109696 700059 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:08.109987 700059 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.110013 700059 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc001ac4f60 2 D0713 05:28:08.110024 700059 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:08.110370 700059 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.110394 700059 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc001ac4f60 3 D0713 05:28:08.110400 700059 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:08.115578 700059 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.115614 700059 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc001ac4f60 4 D0713 05:28:08.115624 700059 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:08.116697 700059 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.116726 700059 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc001ac4f60 5 D0713 05:28:08.116735 700059 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:08.116790 700059 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.116800 700059 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc001ac4f60 6 D0713 05:28:08.116807 700059 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:08.117025 700059 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.117051 700059 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc001ac4f60 7 D0713 05:28:08.117063 700059 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:08.117214 700059 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.117254 700059 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc001ac4f60 8 D0713 05:28:08.117267 700059 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:08.117441 700059 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.117471 700059 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc001ac4f60 9 D0713 05:28:08.117480 700059 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46b6e0 trap addr 682d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:08.117545 700059 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.117567 700059 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc001ac4f60 10 D0713 05:28:08.117575 700059 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:08.117591 700059 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.117596 700059 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc001ac4f60 11 D0713 05:28:08.117604 700059 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46af76 trap addr 68370 ([184 35 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:08.124156 700059 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.124217 700059 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc001ac4f60 12 D0713 05:28:08.124234 700059 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:08.128435 700059 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.128464 700059 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc001ac4f60 13 D0713 05:28:08.128482 700059 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:08.128515 700059 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.128522 700059 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc001ac4f60 14 D0713 05:28:08.128529 700059 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:08.128546 700059 task_signals.go:470] [ 944: 944] Notified of signal 23 D0713 05:28:08.139773 700059 task_signals.go:220] [ 944: 944] Signal 23: delivering to handler I0713 05:28:08.149402 700059 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0713 05:28:08.149506 700059 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.149524 700059 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc001ac4f60 15 D0713 05:28:08.149538 700059 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 05:28:08.149601 700059 task_exit.go:204] [ 944: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.149632 700059 task_exit.go:204] [ 944: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.149654 700059 task_signals.go:204] [ 944: 948] Signal 944, PID: 948, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.149654 700059 task_signals.go:204] [ 944: 947] Signal 944, PID: 947, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.149646 700059 task_signals.go:204] [ 944: 945] Signal 944, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.149666 700059 task_exit.go:204] [ 944: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.149685 700059 task_signals.go:204] [ 944: 946] Signal 944, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.149701 700059 task_exit.go:204] [ 944: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.149708 700059 task_exit.go:204] [ 944: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.149720 700059 task_exit.go:204] [ 944: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.149726 700059 task_exit.go:204] [ 944: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.149729 700059 task_exit.go:204] [ 944: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.149735 700059 task_exit.go:204] [ 944: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.149741 700059 task_exit.go:204] [ 944: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.149745 700059 task_exit.go:204] [ 944: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.149752 700059 task_exit.go:204] [ 944: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.150686 700059 task_exit.go:204] [ 944: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.150721 700059 task_exit.go:204] [ 944: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.150738 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.150771 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.150781 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.150903 700059 task_exit.go:204] [ 944: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.151512 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.152900 700059 syscalls.go:262] [ 949: 949] Allocating stack with size of 8388608 bytes D0713 05:28:08.153048 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.154391 700059 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.154431 700059 usertrap_amd64.go:106] [ 949: 949] Map a usertrap vma at 64000 D0713 05:28:08.154508 700059 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0020b5ef0 1 D0713 05:28:08.154533 700059 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:08.154810 700059 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.154841 700059 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0020b5ef0 2 D0713 05:28:08.154851 700059 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:08.155946 700059 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.155983 700059 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0020b5ef0 3 D0713 05:28:08.155995 700059 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:08.164069 700059 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.164142 700059 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0020b5ef0 4 D0713 05:28:08.164164 700059 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:08.165705 700059 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.165750 700059 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0020b5ef0 5 D0713 05:28:08.165770 700059 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:08.165943 700059 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.166039 700059 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0020b5ef0 6 D0713 05:28:08.166076 700059 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:08.166420 700059 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.166451 700059 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0020b5ef0 7 D0713 05:28:08.166465 700059 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:08.166659 700059 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.166684 700059 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc0020b5ef0 8 D0713 05:28:08.166711 700059 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:08.167161 700059 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.167187 700059 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc0020b5ef0 9 D0713 05:28:08.167204 700059 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:08.167235 700059 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.167245 700059 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0020b5ef0 10 D0713 05:28:08.167254 700059 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:08.167850 700059 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.167884 700059 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc0020b5ef0 11 D0713 05:28:08.167900 700059 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:08.168067 700059 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.168085 700059 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc0020b5ef0 12 D0713 05:28:08.168097 700059 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:08.168148 700059 task_signals.go:470] [ 949: 949] Notified of signal 23 D0713 05:28:08.168389 700059 task_signals.go:220] [ 949: 949] Signal 23: delivering to handler D0713 05:28:08.177038 700059 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.177086 700059 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0020b5ef0 13 D0713 05:28:08.177102 700059 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:08.180306 700059 task_signals.go:470] [ 949: 949] Notified of signal 23 D0713 05:28:08.180431 700059 task_signals.go:220] [ 949: 949] Signal 23: delivering to handler I0713 05:28:08.189980 700059 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0713 05:28:08.190203 700059 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.190242 700059 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0020b5ef0 14 D0713 05:28:08.190262 700059 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:08.190356 700059 task_exit.go:204] [ 949: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.190396 700059 task_exit.go:204] [ 949: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.190437 700059 task_signals.go:204] [ 949: 952] Signal 949, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.190421 700059 task_signals.go:204] [ 949: 950] Signal 949, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.190459 700059 task_exit.go:204] [ 949: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.190489 700059 task_signals.go:204] [ 949: 951] Signal 949, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.190520 700059 task_exit.go:204] [ 949: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.190542 700059 task_exit.go:204] [ 949: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.190600 700059 task_exit.go:204] [ 949: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.190672 700059 task_signals.go:204] [ 949: 953] Signal 949, PID: 953, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.190746 700059 task_exit.go:204] [ 949: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.190795 700059 task_exit.go:204] [ 949: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.190839 700059 task_exit.go:204] [ 949: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.190865 700059 task_exit.go:204] [ 949: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.190872 700059 task_exit.go:204] [ 949: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.190887 700059 task_exit.go:204] [ 949: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.192433 700059 task_exit.go:204] [ 949: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.192504 700059 task_exit.go:204] [ 949: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.192529 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.192607 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.192632 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.192688 700059 task_exit.go:204] [ 949: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.192984 700059 task_signals.go:470] [ 6: 20] Notified of signal 23 D0713 05:28:08.193070 700059 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 05:28:08.193588 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.195479 700059 syscalls.go:262] [ 954: 954] Allocating stack with size of 8388608 bytes D0713 05:28:08.195643 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.196579 700059 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.196641 700059 usertrap_amd64.go:106] [ 954: 954] Map a usertrap vma at 6a000 D0713 05:28:08.196729 700059 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc000687cb0 1 D0713 05:28:08.196768 700059 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:08.197382 700059 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.197442 700059 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc000687cb0 2 D0713 05:28:08.197459 700059 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:08.198054 700059 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.198072 700059 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc000687cb0 3 D0713 05:28:08.198085 700059 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:08.205195 700059 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.205237 700059 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc000687cb0 4 D0713 05:28:08.205254 700059 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:08.206802 700059 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.206839 700059 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc000687cb0 5 D0713 05:28:08.206852 700059 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:08.206921 700059 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.206937 700059 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc000687cb0 6 D0713 05:28:08.206947 700059 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:08.207330 700059 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.207357 700059 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc000687cb0 7 D0713 05:28:08.207366 700059 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:08.207539 700059 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.207564 700059 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc000687cb0 8 D0713 05:28:08.207575 700059 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:08.207827 700059 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.207850 700059 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc000687cb0 9 D0713 05:28:08.207858 700059 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:08.208002 700059 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.208023 700059 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc000687cb0 10 D0713 05:28:08.208123 700059 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:08.216726 700059 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.216777 700059 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc000687cb0 11 D0713 05:28:08.216795 700059 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:08.219651 700059 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.219692 700059 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc000687cb0 12 D0713 05:28:08.219711 700059 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:08.219810 700059 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.219836 700059 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc000687cb0 13 D0713 05:28:08.219846 700059 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:08.219928 700059 task_signals.go:470] [ 954: 954] Notified of signal 23 D0713 05:28:08.220000 700059 task_signals.go:220] [ 954: 954] Signal 23: delivering to handler I0713 05:28:08.228659 700059 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0713 05:28:08.228730 700059 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.228745 700059 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc000687cb0 14 D0713 05:28:08.228758 700059 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:08.228834 700059 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.228854 700059 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.228879 700059 task_signals.go:204] [ 954: 957] Signal 954, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.228885 700059 task_signals.go:204] [ 954: 956] Signal 954, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.228908 700059 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.228911 700059 task_signals.go:204] [ 954: 958] Signal 954, PID: 958, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.228935 700059 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.228983 700059 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.229005 700059 task_signals.go:204] [ 954: 955] Signal 954, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.229018 700059 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.229027 700059 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.229033 700059 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.229041 700059 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.229057 700059 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.229062 700059 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.229076 700059 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.230112 700059 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.230147 700059 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.230171 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.230218 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.230235 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.230365 700059 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.231058 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.232712 700059 syscalls.go:262] [ 959: 959] Allocating stack with size of 8388608 bytes D0713 05:28:08.232835 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.234107 700059 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.234154 700059 usertrap_amd64.go:106] [ 959: 959] Map a usertrap vma at 67000 D0713 05:28:08.234240 700059 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc00139bf20 1 D0713 05:28:08.234263 700059 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:08.234451 700059 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.234472 700059 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc00139bf20 2 D0713 05:28:08.234479 700059 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:08.235079 700059 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.235108 700059 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc00139bf20 3 D0713 05:28:08.235119 700059 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:08.241137 700059 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.241167 700059 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc00139bf20 4 D0713 05:28:08.241180 700059 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:08.243778 700059 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.243822 700059 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc00139bf20 5 D0713 05:28:08.243843 700059 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:08.243900 700059 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.243908 700059 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc00139bf20 6 D0713 05:28:08.243915 700059 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:08.244233 700059 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.244248 700059 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc00139bf20 7 D0713 05:28:08.244258 700059 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:08.244415 700059 usertrap_amd64.go:212] [ 959: 960] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.244485 700059 usertrap_amd64.go:122] [ 959: 960] Allocate a new trap: 0xc00139bf20 8 D0713 05:28:08.244508 700059 usertrap_amd64.go:225] [ 959: 960] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:08.244647 700059 usertrap_amd64.go:212] [ 959: 960] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.244672 700059 usertrap_amd64.go:122] [ 959: 960] Allocate a new trap: 0xc00139bf20 9 D0713 05:28:08.244681 700059 usertrap_amd64.go:225] [ 959: 960] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:08.244700 700059 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.244707 700059 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc00139bf20 10 D0713 05:28:08.244715 700059 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:08.245213 700059 usertrap_amd64.go:212] [ 959: 960] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.245245 700059 usertrap_amd64.go:122] [ 959: 960] Allocate a new trap: 0xc00139bf20 11 D0713 05:28:08.245257 700059 usertrap_amd64.go:225] [ 959: 960] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:08.245355 700059 usertrap_amd64.go:212] [ 959: 960] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.245366 700059 usertrap_amd64.go:122] [ 959: 960] Allocate a new trap: 0xc00139bf20 12 D0713 05:28:08.245376 700059 usertrap_amd64.go:225] [ 959: 960] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:08.245398 700059 task_signals.go:470] [ 959: 959] Notified of signal 23 D0713 05:28:08.245465 700059 task_signals.go:220] [ 959: 959] Signal 23: delivering to handler D0713 05:28:08.251730 700059 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.251759 700059 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc00139bf20 13 D0713 05:28:08.251770 700059 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:08.255778 700059 task_signals.go:470] [ 959: 959] Notified of signal 23 D0713 05:28:08.255838 700059 task_signals.go:220] [ 959: 959] Signal 23: delivering to handler I0713 05:28:08.261823 700059 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0713 05:28:08.261866 700059 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.261876 700059 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc00139bf20 14 D0713 05:28:08.261886 700059 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:08.261918 700059 task_exit.go:204] [ 959: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.261938 700059 task_exit.go:204] [ 959: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.261965 700059 task_signals.go:204] [ 959: 962] Signal 959, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.261999 700059 task_exit.go:204] [ 959: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.261956 700059 task_signals.go:204] [ 959: 961] Signal 959, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.262010 700059 task_exit.go:204] [ 959: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.262036 700059 task_exit.go:204] [ 959: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.261997 700059 task_signals.go:204] [ 959: 960] Signal 959, PID: 960, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.262068 700059 task_exit.go:204] [ 959: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.262081 700059 task_signals.go:204] [ 959: 963] Signal 959, PID: 963, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.262099 700059 task_exit.go:204] [ 959: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.262119 700059 task_exit.go:204] [ 959: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.262132 700059 task_exit.go:204] [ 959: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.262140 700059 task_exit.go:204] [ 959: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.262157 700059 task_exit.go:204] [ 959: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.262177 700059 task_exit.go:204] [ 959: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.263203 700059 task_exit.go:204] [ 959: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.263232 700059 task_exit.go:204] [ 959: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.263249 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.267534 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.267567 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.267816 700059 task_exit.go:204] [ 959: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.268393 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.269225 700059 task_signals.go:481] [ 6: 8] No task notified of signal 23 D0713 05:28:08.269650 700059 syscalls.go:262] [ 964: 964] Allocating stack with size of 8388608 bytes D0713 05:28:08.269764 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.269914 700059 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0713 05:28:08.270051 700059 task_signals.go:470] [ 6: 8] Notified of signal 23 D0713 05:28:08.270082 700059 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0713 05:28:08.270775 700059 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.270818 700059 usertrap_amd64.go:106] [ 964: 964] Map a usertrap vma at 64000 D0713 05:28:08.270913 700059 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000b0c240 1 D0713 05:28:08.270943 700059 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:08.271389 700059 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.271409 700059 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000b0c240 2 D0713 05:28:08.271419 700059 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:08.271849 700059 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.271877 700059 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000b0c240 3 D0713 05:28:08.271888 700059 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:08.277863 700059 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.277898 700059 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000b0c240 4 D0713 05:28:08.277910 700059 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:08.279179 700059 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.279220 700059 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000b0c240 5 D0713 05:28:08.279235 700059 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:08.279292 700059 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.279308 700059 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000b0c240 6 D0713 05:28:08.279313 700059 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:08.279971 700059 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.280001 700059 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000b0c240 7 D0713 05:28:08.280015 700059 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:08.280169 700059 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.280188 700059 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc000b0c240 8 D0713 05:28:08.280197 700059 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:08.280328 700059 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.280352 700059 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc000b0c240 9 D0713 05:28:08.280362 700059 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46b6e0 trap addr 642d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:08.280383 700059 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.280390 700059 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000b0c240 10 D0713 05:28:08.280488 700059 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:08.280590 700059 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.280620 700059 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc000b0c240 11 D0713 05:28:08.280632 700059 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46af76 trap addr 64370 ([184 35 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:08.288631 700059 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.288678 700059 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000b0c240 12 D0713 05:28:08.288691 700059 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:08.298262 700059 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.298303 700059 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc000b0c240 13 D0713 05:28:08.298318 700059 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:08.298382 700059 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.298402 700059 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc000b0c240 14 D0713 05:28:08.298416 700059 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:08.298495 700059 task_signals.go:470] [ 964: 964] Notified of signal 23 D0713 05:28:08.298644 700059 task_signals.go:220] [ 964: 964] Signal 23: delivering to handler I0713 05:28:08.305814 700059 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0713 05:28:08.305897 700059 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.305908 700059 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000b0c240 15 D0713 05:28:08.305918 700059 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 05:28:08.305942 700059 task_exit.go:204] [ 964: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.305959 700059 task_exit.go:204] [ 964: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.305981 700059 task_signals.go:204] [ 964: 965] Signal 964, PID: 965, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.305998 700059 task_exit.go:204] [ 964: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.306010 700059 task_exit.go:204] [ 964: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.306009 700059 task_signals.go:204] [ 964: 966] Signal 964, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.306016 700059 task_exit.go:204] [ 964: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.305990 700059 task_signals.go:204] [ 964: 967] Signal 964, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.306040 700059 task_exit.go:204] [ 964: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.306074 700059 task_signals.go:204] [ 964: 968] Signal 964, PID: 968, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.306095 700059 task_exit.go:204] [ 964: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.306102 700059 task_exit.go:204] [ 964: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.306113 700059 task_exit.go:204] [ 964: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.306121 700059 task_exit.go:204] [ 964: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.306126 700059 task_exit.go:204] [ 964: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.306134 700059 task_exit.go:204] [ 964: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.307102 700059 task_exit.go:204] [ 964: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.307141 700059 task_exit.go:204] [ 964: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.307156 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.307193 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.307202 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.307301 700059 task_exit.go:204] [ 964: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.307870 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.309402 700059 syscalls.go:262] [ 969: 969] Allocating stack with size of 8388608 bytes D0713 05:28:08.309490 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.309967 700059 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.310000 700059 usertrap_amd64.go:106] [ 969: 969] Map a usertrap vma at 6a000 D0713 05:28:08.310231 700059 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc0015acdb0 1 D0713 05:28:08.310263 700059 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:08.312438 700059 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.312475 700059 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc0015acdb0 2 D0713 05:28:08.312487 700059 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:08.313032 700059 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.313061 700059 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc0015acdb0 3 D0713 05:28:08.313072 700059 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:08.322149 700059 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.322175 700059 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc0015acdb0 4 D0713 05:28:08.322186 700059 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:08.324791 700059 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.324815 700059 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc0015acdb0 5 D0713 05:28:08.324831 700059 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:08.324926 700059 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.324991 700059 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc0015acdb0 6 D0713 05:28:08.325003 700059 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:08.325236 700059 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.325256 700059 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc0015acdb0 7 D0713 05:28:08.325265 700059 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:08.325410 700059 usertrap_amd64.go:212] [ 969: 970] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.325440 700059 usertrap_amd64.go:122] [ 969: 970] Allocate a new trap: 0xc0015acdb0 8 D0713 05:28:08.325454 700059 usertrap_amd64.go:225] [ 969: 970] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:08.325668 700059 usertrap_amd64.go:212] [ 969: 970] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.325680 700059 usertrap_amd64.go:122] [ 969: 970] Allocate a new trap: 0xc0015acdb0 9 D0713 05:28:08.325689 700059 usertrap_amd64.go:225] [ 969: 970] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:08.325896 700059 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.325916 700059 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc0015acdb0 10 D0713 05:28:08.325926 700059 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46b6e0 trap addr 6a320 ([184 24 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:08.325998 700059 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.326013 700059 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc0015acdb0 11 D0713 05:28:08.326028 700059 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46b57c trap addr 6a370 ([184 202 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:08.332003 700059 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.332028 700059 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc0015acdb0 12 D0713 05:28:08.332037 700059 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:08.337578 700059 usertrap_amd64.go:212] [ 969: 970] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.337615 700059 usertrap_amd64.go:122] [ 969: 970] Allocate a new trap: 0xc0015acdb0 13 D0713 05:28:08.337628 700059 usertrap_amd64.go:225] [ 969: 970] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:08.337691 700059 usertrap_amd64.go:212] [ 969: 970] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.337700 700059 usertrap_amd64.go:122] [ 969: 970] Allocate a new trap: 0xc0015acdb0 14 D0713 05:28:08.337713 700059 usertrap_amd64.go:225] [ 969: 970] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:08.337733 700059 task_signals.go:470] [ 969: 969] Notified of signal 23 D0713 05:28:08.337825 700059 task_signals.go:220] [ 969: 969] Signal 23: delivering to handler I0713 05:28:08.341201 700059 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0713 05:28:08.341268 700059 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.341275 700059 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc0015acdb0 15 D0713 05:28:08.341282 700059 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 05:28:08.341305 700059 task_exit.go:204] [ 969: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.341328 700059 task_exit.go:204] [ 969: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.341348 700059 task_signals.go:204] [ 969: 972] Signal 969, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.341363 700059 task_signals.go:204] [ 969: 970] Signal 969, PID: 970, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.341369 700059 task_exit.go:204] [ 969: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.341388 700059 task_exit.go:204] [ 969: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.341397 700059 task_exit.go:204] [ 969: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.341346 700059 task_signals.go:204] [ 969: 971] Signal 969, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.341421 700059 task_exit.go:204] [ 969: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.341429 700059 task_exit.go:204] [ 969: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.341434 700059 task_exit.go:204] [ 969: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.341445 700059 task_signals.go:204] [ 969: 973] Signal 969, PID: 973, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.341455 700059 task_exit.go:204] [ 969: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.341469 700059 task_exit.go:204] [ 969: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.341475 700059 task_exit.go:204] [ 969: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.341486 700059 task_exit.go:204] [ 969: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.342375 700059 task_exit.go:204] [ 969: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.342402 700059 task_exit.go:204] [ 969: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.342418 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.342491 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.342519 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.342573 700059 task_exit.go:204] [ 969: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.343096 700059 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.344215 700059 syscalls.go:262] [ 974: 974] Allocating stack with size of 8388608 bytes D0713 05:28:08.344315 700059 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.345076 700059 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.345108 700059 usertrap_amd64.go:106] [ 974: 974] Map a usertrap vma at 64000 D0713 05:28:08.345299 700059 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc0007577d0 1 D0713 05:28:08.345328 700059 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:08.345637 700059 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.345652 700059 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc0007577d0 2 D0713 05:28:08.345661 700059 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:08.346207 700059 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.346228 700059 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc0007577d0 3 D0713 05:28:08.346239 700059 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:08.351659 700059 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.351737 700059 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc0007577d0 4 D0713 05:28:08.351761 700059 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:08.352909 700059 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.352937 700059 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc0007577d0 5 D0713 05:28:08.353086 700059 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:08.353138 700059 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.353147 700059 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc0007577d0 6 D0713 05:28:08.353165 700059 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:08.353405 700059 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.353429 700059 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc0007577d0 7 D0713 05:28:08.353438 700059 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:08.353633 700059 usertrap_amd64.go:212] [ 974: 975] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.353652 700059 usertrap_amd64.go:122] [ 974: 975] Allocate a new trap: 0xc0007577d0 8 D0713 05:28:08.353660 700059 usertrap_amd64.go:225] [ 974: 975] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:08.353823 700059 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.353846 700059 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc0007577d0 9 D0713 05:28:08.353857 700059 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:08.353870 700059 usertrap_amd64.go:212] [ 974: 975] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.353878 700059 usertrap_amd64.go:122] [ 974: 975] Allocate a new trap: 0xc0007577d0 10 D0713 05:28:08.353885 700059 usertrap_amd64.go:225] [ 974: 975] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:08.360932 700059 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.360997 700059 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc0007577d0 11 D0713 05:28:08.361010 700059 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:08.365111 700059 usertrap_amd64.go:212] [ 974: 975] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.365140 700059 usertrap_amd64.go:122] [ 974: 975] Allocate a new trap: 0xc0007577d0 12 D0713 05:28:08.365153 700059 usertrap_amd64.go:225] [ 974: 975] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:08.365220 700059 usertrap_amd64.go:212] [ 974: 975] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.365230 700059 usertrap_amd64.go:122] [ 974: 975] Allocate a new trap: 0xc0007577d0 13 D0713 05:28:08.365239 700059 usertrap_amd64.go:225] [ 974: 975] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:08.365256 700059 task_signals.go:470] [ 974: 974] Notified of signal 23 D0713 05:28:08.365411 700059 task_signals.go:220] [ 974: 974] Signal 23: delivering to handler D0713 05:28:08.371186 700059 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.371218 700059 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc0007577d0 14 D0713 05:28:08.371232 700059 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:08.371281 700059 task_exit.go:204] [ 974: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.371300 700059 task_exit.go:204] [ 974: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.371327 700059 task_signals.go:204] [ 974: 975] Signal 974, PID: 975, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.371352 700059 task_exit.go:204] [ 974: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.371361 700059 task_exit.go:204] [ 974: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.371374 700059 task_exit.go:204] [ 974: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.371394 700059 task_signals.go:204] [ 974: 976] Signal 974, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.371411 700059 task_exit.go:204] [ 974: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.371416 700059 task_exit.go:204] [ 974: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.371419 700059 task_exit.go:204] [ 974: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.371436 700059 task_signals.go:204] [ 974: 977] Signal 974, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.371463 700059 task_exit.go:204] [ 974: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.371471 700059 task_exit.go:204] [ 974: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.371477 700059 task_exit.go:204] [ 974: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.371493 700059 task_signals.go:204] [ 974: 978] Signal 974, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.371503 700059 task_exit.go:204] [ 974: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.372459 700059 task_exit.go:204] [ 974: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.372496 700059 task_exit.go:204] [ 974: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.372511 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.372539 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.372556 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.372685 700059 task_exit.go:204] [ 974: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.373250 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.374480 700059 syscalls.go:262] [ 979: 979] Allocating stack with size of 8388608 bytes D0713 05:28:08.374580 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.376931 700059 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.377009 700059 usertrap_amd64.go:106] [ 979: 979] Map a usertrap vma at 65000 D0713 05:28:08.377098 700059 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc0015ad2f0 1 D0713 05:28:08.377131 700059 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:08.377442 700059 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.377476 700059 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc0015ad2f0 2 D0713 05:28:08.377489 700059 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:08.377865 700059 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.377883 700059 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc0015ad2f0 3 D0713 05:28:08.377892 700059 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:08.384756 700059 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.384773 700059 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc0015ad2f0 4 D0713 05:28:08.384782 700059 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:08.385912 700059 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.385927 700059 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc0015ad2f0 5 D0713 05:28:08.385936 700059 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:08.385949 700059 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.385953 700059 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc0015ad2f0 6 D0713 05:28:08.385958 700059 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:08.386146 700059 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.386165 700059 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc0015ad2f0 7 D0713 05:28:08.386174 700059 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:08.386364 700059 usertrap_amd64.go:212] [ 979: 980] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.386388 700059 usertrap_amd64.go:122] [ 979: 980] Allocate a new trap: 0xc0015ad2f0 8 D0713 05:28:08.386401 700059 usertrap_amd64.go:225] [ 979: 980] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:08.386606 700059 usertrap_amd64.go:212] [ 979: 980] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.386634 700059 usertrap_amd64.go:122] [ 979: 980] Allocate a new trap: 0xc0015ad2f0 9 D0713 05:28:08.386647 700059 usertrap_amd64.go:225] [ 979: 980] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:08.386655 700059 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.386660 700059 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc0015ad2f0 10 D0713 05:28:08.386665 700059 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:08.393358 700059 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.393390 700059 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc0015ad2f0 11 D0713 05:28:08.393401 700059 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:08.397619 700059 usertrap_amd64.go:212] [ 979: 980] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.397641 700059 usertrap_amd64.go:122] [ 979: 980] Allocate a new trap: 0xc0015ad2f0 12 D0713 05:28:08.397654 700059 usertrap_amd64.go:225] [ 979: 980] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:08.397702 700059 usertrap_amd64.go:212] [ 979: 980] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.397732 700059 usertrap_amd64.go:122] [ 979: 980] Allocate a new trap: 0xc0015ad2f0 13 D0713 05:28:08.397744 700059 usertrap_amd64.go:225] [ 979: 980] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:08.397871 700059 task_signals.go:470] [ 979: 979] Notified of signal 23 D0713 05:28:08.398035 700059 task_signals.go:220] [ 979: 979] Signal 23: delivering to handler D0713 05:28:08.402719 700059 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.402742 700059 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc0015ad2f0 14 D0713 05:28:08.402750 700059 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:08.402798 700059 task_exit.go:204] [ 979: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.402827 700059 task_exit.go:204] [ 979: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.402843 700059 task_signals.go:204] [ 979: 981] Signal 979, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.402852 700059 task_signals.go:204] [ 979: 982] Signal 979, PID: 982, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.402872 700059 task_signals.go:204] [ 979: 983] Signal 979, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.402884 700059 task_exit.go:204] [ 979: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.402895 700059 task_signals.go:204] [ 979: 980] Signal 979, PID: 980, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.402916 700059 task_exit.go:204] [ 979: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.402934 700059 task_exit.go:204] [ 979: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.402950 700059 task_exit.go:204] [ 979: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.402959 700059 task_exit.go:204] [ 979: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.402965 700059 task_exit.go:204] [ 979: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.402974 700059 task_exit.go:204] [ 979: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.403001 700059 task_exit.go:204] [ 979: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.403029 700059 task_exit.go:204] [ 979: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.403074 700059 task_exit.go:204] [ 979: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.404077 700059 task_exit.go:204] [ 979: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.404121 700059 task_exit.go:204] [ 979: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.404140 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.404199 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.404222 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.404345 700059 task_exit.go:204] [ 979: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.405169 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.406515 700059 syscalls.go:262] [ 984: 984] Allocating stack with size of 8388608 bytes D0713 05:28:08.406638 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.407901 700059 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.407939 700059 usertrap_amd64.go:106] [ 984: 984] Map a usertrap vma at 65000 D0713 05:28:08.408054 700059 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc001568600 1 D0713 05:28:08.408074 700059 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:08.408365 700059 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.408390 700059 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc001568600 2 D0713 05:28:08.408403 700059 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:08.408988 700059 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.409016 700059 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc001568600 3 D0713 05:28:08.409027 700059 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:08.414017 700059 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.414038 700059 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc001568600 4 D0713 05:28:08.414048 700059 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:08.415074 700059 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.415226 700059 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc001568600 5 D0713 05:28:08.415300 700059 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:08.415391 700059 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.415408 700059 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc001568600 6 D0713 05:28:08.415419 700059 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:08.415790 700059 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.415816 700059 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc001568600 7 D0713 05:28:08.415826 700059 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:08.415983 700059 usertrap_amd64.go:212] [ 984: 985] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.416008 700059 usertrap_amd64.go:122] [ 984: 985] Allocate a new trap: 0xc001568600 8 D0713 05:28:08.416020 700059 usertrap_amd64.go:225] [ 984: 985] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:08.416159 700059 usertrap_amd64.go:212] [ 984: 985] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.416181 700059 usertrap_amd64.go:122] [ 984: 985] Allocate a new trap: 0xc001568600 9 D0713 05:28:08.416189 700059 usertrap_amd64.go:225] [ 984: 985] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:08.416232 700059 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.416241 700059 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc001568600 10 D0713 05:28:08.416252 700059 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:08.422634 700059 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.422657 700059 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc001568600 11 D0713 05:28:08.422666 700059 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:08.427820 700059 usertrap_amd64.go:212] [ 984: 985] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.427867 700059 usertrap_amd64.go:122] [ 984: 985] Allocate a new trap: 0xc001568600 12 D0713 05:28:08.427882 700059 usertrap_amd64.go:225] [ 984: 985] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:08.427934 700059 usertrap_amd64.go:212] [ 984: 985] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.427951 700059 usertrap_amd64.go:122] [ 984: 985] Allocate a new trap: 0xc001568600 13 D0713 05:28:08.427973 700059 usertrap_amd64.go:225] [ 984: 985] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:08.428035 700059 task_signals.go:470] [ 984: 984] Notified of signal 23 D0713 05:28:08.428083 700059 task_signals.go:220] [ 984: 984] Signal 23: delivering to handler D0713 05:28:08.431579 700059 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.431608 700059 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc001568600 14 D0713 05:28:08.431623 700059 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:08.431683 700059 task_exit.go:204] [ 984: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.431753 700059 task_exit.go:204] [ 984: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.431797 700059 task_signals.go:204] [ 984: 986] Signal 984, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.431814 700059 task_exit.go:204] [ 984: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.431824 700059 task_exit.go:204] [ 984: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.431830 700059 task_exit.go:204] [ 984: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.431846 700059 task_signals.go:204] [ 984: 985] Signal 984, PID: 985, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.431876 700059 task_exit.go:204] [ 984: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.431885 700059 task_exit.go:204] [ 984: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.431891 700059 task_exit.go:204] [ 984: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.431903 700059 task_signals.go:204] [ 984: 988] Signal 984, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.431922 700059 task_exit.go:204] [ 984: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.431930 700059 task_exit.go:204] [ 984: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.431936 700059 task_exit.go:204] [ 984: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.431959 700059 task_signals.go:204] [ 984: 987] Signal 984, PID: 987, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.431978 700059 task_exit.go:204] [ 984: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.433043 700059 task_exit.go:204] [ 984: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.433118 700059 task_exit.go:204] [ 984: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.433151 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.433199 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.433438 700059 task_exit.go:204] [ 984: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.433611 700059 task_signals.go:470] [ 6: 8] Notified of signal 23 I0713 05:28:08.433599 700059 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0713 05:28:08.433676 700059 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0713 05:28:08.434121 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.435476 700059 syscalls.go:262] [ 989: 989] Allocating stack with size of 8388608 bytes D0713 05:28:08.435571 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.436713 700059 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.436763 700059 usertrap_amd64.go:106] [ 989: 989] Map a usertrap vma at 67000 D0713 05:28:08.436928 700059 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc0005aad20 1 D0713 05:28:08.436997 700059 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:08.437384 700059 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.437408 700059 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc0005aad20 2 D0713 05:28:08.437418 700059 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:08.438025 700059 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.438046 700059 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc0005aad20 3 D0713 05:28:08.438057 700059 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:08.443694 700059 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.443723 700059 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc0005aad20 4 D0713 05:28:08.443733 700059 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:08.445018 700059 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.445047 700059 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc0005aad20 5 D0713 05:28:08.445059 700059 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:08.445124 700059 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.445155 700059 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc0005aad20 6 D0713 05:28:08.445168 700059 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:08.445570 700059 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.445594 700059 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc0005aad20 7 D0713 05:28:08.445602 700059 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:08.445734 700059 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.445754 700059 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc0005aad20 8 D0713 05:28:08.445764 700059 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:08.445904 700059 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.445935 700059 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc0005aad20 9 D0713 05:28:08.445960 700059 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:08.445984 700059 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.445992 700059 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc0005aad20 10 D0713 05:28:08.446000 700059 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:08.446394 700059 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.446420 700059 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc0005aad20 11 D0713 05:28:08.446447 700059 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:08.446540 700059 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.446561 700059 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc0005aad20 12 D0713 05:28:08.446570 700059 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:08.446609 700059 task_signals.go:470] [ 989: 989] Notified of signal 23 D0713 05:28:08.446662 700059 task_signals.go:220] [ 989: 989] Signal 23: delivering to handler D0713 05:28:08.452660 700059 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.452687 700059 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc0005aad20 13 D0713 05:28:08.452702 700059 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:08.457019 700059 task_signals.go:470] [ 989: 989] Notified of signal 23 D0713 05:28:08.457073 700059 task_signals.go:220] [ 989: 989] Signal 23: delivering to handler I0713 05:28:08.462847 700059 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0713 05:28:08.462943 700059 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.462960 700059 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc0005aad20 14 D0713 05:28:08.462972 700059 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:08.463048 700059 task_exit.go:204] [ 989: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.463072 700059 task_exit.go:204] [ 989: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.463093 700059 task_signals.go:204] [ 989: 991] Signal 989, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.463114 700059 task_signals.go:204] [ 989: 992] Signal 989, PID: 992, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.463133 700059 task_exit.go:204] [ 989: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.463107 700059 task_signals.go:204] [ 989: 993] Signal 989, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.463154 700059 task_exit.go:204] [ 989: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.463176 700059 task_exit.go:204] [ 989: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.463197 700059 task_signals.go:204] [ 989: 990] Signal 989, PID: 990, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.463221 700059 task_exit.go:204] [ 989: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.463232 700059 task_exit.go:204] [ 989: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.463238 700059 task_exit.go:204] [ 989: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.463248 700059 task_exit.go:204] [ 989: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.463298 700059 task_exit.go:204] [ 989: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.463315 700059 task_exit.go:204] [ 989: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.463335 700059 task_exit.go:204] [ 989: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.464394 700059 task_exit.go:204] [ 989: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.464422 700059 task_exit.go:204] [ 989: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.464439 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.464504 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.464731 700059 task_exit.go:204] [ 989: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.465419 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.467029 700059 syscalls.go:262] [ 994: 994] Allocating stack with size of 8388608 bytes D0713 05:28:08.467213 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.468070 700059 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.468111 700059 usertrap_amd64.go:106] [ 994: 994] Map a usertrap vma at 64000 D0713 05:28:08.468191 700059 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc001a410e0 1 D0713 05:28:08.468232 700059 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:08.468433 700059 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.468463 700059 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc001a410e0 2 D0713 05:28:08.468475 700059 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:08.469100 700059 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.469121 700059 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc001a410e0 3 D0713 05:28:08.469132 700059 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:08.475048 700059 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.475094 700059 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc001a410e0 4 D0713 05:28:08.475114 700059 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:08.476258 700059 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.476297 700059 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc001a410e0 5 D0713 05:28:08.476315 700059 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:08.476380 700059 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.476390 700059 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc001a410e0 6 D0713 05:28:08.476399 700059 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:08.476741 700059 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.476772 700059 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc001a410e0 7 D0713 05:28:08.476783 700059 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:08.476985 700059 usertrap_amd64.go:212] [ 994: 995] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.477016 700059 usertrap_amd64.go:122] [ 994: 995] Allocate a new trap: 0xc001a410e0 8 D0713 05:28:08.477028 700059 usertrap_amd64.go:225] [ 994: 995] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:08.477169 700059 usertrap_amd64.go:212] [ 994: 995] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.477197 700059 usertrap_amd64.go:122] [ 994: 995] Allocate a new trap: 0xc001a410e0 9 D0713 05:28:08.477212 700059 usertrap_amd64.go:225] [ 994: 995] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:08.477290 700059 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.477297 700059 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc001a410e0 10 D0713 05:28:08.477307 700059 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:08.484296 700059 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.484319 700059 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc001a410e0 11 D0713 05:28:08.484329 700059 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:08.487484 700059 usertrap_amd64.go:212] [ 994: 995] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.487513 700059 usertrap_amd64.go:122] [ 994: 995] Allocate a new trap: 0xc001a410e0 12 D0713 05:28:08.487525 700059 usertrap_amd64.go:225] [ 994: 995] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:08.487619 700059 usertrap_amd64.go:212] [ 994: 995] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.487637 700059 usertrap_amd64.go:122] [ 994: 995] Allocate a new trap: 0xc001a410e0 13 D0713 05:28:08.487647 700059 usertrap_amd64.go:225] [ 994: 995] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:08.487681 700059 task_signals.go:470] [ 994: 994] Notified of signal 23 D0713 05:28:08.487733 700059 task_signals.go:220] [ 994: 994] Signal 23: delivering to handler I0713 05:28:08.493787 700059 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0713 05:28:08.493860 700059 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.493881 700059 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc001a410e0 14 D0713 05:28:08.493891 700059 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:08.493955 700059 task_exit.go:204] [ 994: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.493981 700059 task_exit.go:204] [ 994: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.494001 700059 task_signals.go:204] [ 994: 997] Signal 994, PID: 997, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.494011 700059 task_exit.go:204] [ 994: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.494002 700059 task_signals.go:204] [ 994: 996] Signal 994, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.494016 700059 task_exit.go:204] [ 994: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.494026 700059 task_exit.go:204] [ 994: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.494072 700059 task_signals.go:204] [ 994: 995] Signal 994, PID: 995, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.494102 700059 task_exit.go:204] [ 994: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.494168 700059 task_signals.go:204] [ 994: 998] Signal 994, PID: 998, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.494205 700059 task_exit.go:204] [ 994: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.494216 700059 task_exit.go:204] [ 994: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.494229 700059 task_exit.go:204] [ 994: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.494251 700059 task_exit.go:204] [ 994: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.494255 700059 task_exit.go:204] [ 994: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.494262 700059 task_exit.go:204] [ 994: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.495226 700059 task_exit.go:204] [ 994: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.495270 700059 task_exit.go:204] [ 994: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.495287 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.495317 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:08.495328 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.495492 700059 task_exit.go:204] [ 994: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.495995 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.497117 700059 syscalls.go:262] [ 999: 999] Allocating stack with size of 8388608 bytes D0713 05:28:08.497219 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.499397 700059 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.499426 700059 usertrap_amd64.go:106] [ 999: 999] Map a usertrap vma at 69000 D0713 05:28:08.499544 700059 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc001568cc0 1 D0713 05:28:08.499613 700059 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:08.500072 700059 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.500104 700059 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc001568cc0 2 D0713 05:28:08.500121 700059 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:08.500796 700059 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.500826 700059 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc001568cc0 3 D0713 05:28:08.500840 700059 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:08.507280 700059 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.507327 700059 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc001568cc0 4 D0713 05:28:08.507352 700059 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:08.508550 700059 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.508638 700059 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc001568cc0 5 D0713 05:28:08.508687 700059 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:08.508907 700059 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.508935 700059 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc001568cc0 6 D0713 05:28:08.508976 700059 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:08.509665 700059 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.509679 700059 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc001568cc0 7 D0713 05:28:08.509688 700059 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:08.509960 700059 usertrap_amd64.go:212] [ 999: 1000] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.509986 700059 usertrap_amd64.go:122] [ 999: 1000] Allocate a new trap: 0xc001568cc0 8 D0713 05:28:08.509997 700059 usertrap_amd64.go:225] [ 999: 1000] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:08.510257 700059 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.510296 700059 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc001568cc0 9 D0713 05:28:08.510316 700059 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:08.510332 700059 usertrap_amd64.go:212] [ 999: 1000] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.510340 700059 usertrap_amd64.go:122] [ 999: 1000] Allocate a new trap: 0xc001568cc0 10 D0713 05:28:08.510348 700059 usertrap_amd64.go:225] [ 999: 1000] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:08.510566 700059 usertrap_amd64.go:212] [ 999: 1002] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.510595 700059 usertrap_amd64.go:122] [ 999: 1002] Allocate a new trap: 0xc001568cc0 11 D0713 05:28:08.510605 700059 usertrap_amd64.go:225] [ 999: 1002] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:08.517570 700059 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.517598 700059 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc001568cc0 12 D0713 05:28:08.517621 700059 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:08.521407 700059 usertrap_amd64.go:212] [ 999: 1000] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.521436 700059 usertrap_amd64.go:122] [ 999: 1000] Allocate a new trap: 0xc001568cc0 13 D0713 05:28:08.521455 700059 usertrap_amd64.go:225] [ 999: 1000] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:08.521520 700059 usertrap_amd64.go:212] [ 999: 1000] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.521537 700059 usertrap_amd64.go:122] [ 999: 1000] Allocate a new trap: 0xc001568cc0 14 D0713 05:28:08.521547 700059 usertrap_amd64.go:225] [ 999: 1000] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:08.521565 700059 task_signals.go:470] [ 999: 999] Notified of signal 23 D0713 05:28:08.521595 700059 task_signals.go:220] [ 999: 999] Signal 23: delivering to handler D0713 05:28:08.526811 700059 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.526842 700059 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc001568cc0 15 D0713 05:28:08.526854 700059 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 05:28:08.526936 700059 task_exit.go:204] [ 999: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.526976 700059 task_exit.go:204] [ 999: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.526999 700059 task_signals.go:204] [ 999: 1001] Signal 999, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.527004 700059 task_signals.go:204] [ 999: 1002] Signal 999, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.527051 700059 task_exit.go:204] [ 999: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.527090 700059 task_exit.go:204] [ 999: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.527102 700059 task_exit.go:204] [ 999: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.527123 700059 task_exit.go:204] [ 999: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.527143 700059 task_exit.go:204] [ 999: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.527147 700059 task_exit.go:204] [ 999: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.527176 700059 task_signals.go:204] [ 999: 1003] Signal 999, PID: 1003, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.527196 700059 task_exit.go:204] [ 999: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.527205 700059 task_exit.go:204] [ 999: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.527212 700059 task_exit.go:204] [ 999: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.527225 700059 task_signals.go:204] [ 999: 1000] Signal 999, PID: 1000, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.527246 700059 task_exit.go:204] [ 999: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.528188 700059 task_exit.go:204] [ 999: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.528225 700059 task_exit.go:204] [ 999: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.528380 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.528500 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:08.528521 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.528736 700059 task_exit.go:204] [ 999: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.529928 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.531500 700059 syscalls.go:262] [ 1004: 1004] Allocating stack with size of 8388608 bytes D0713 05:28:08.531633 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.532130 700059 task_signals.go:470] [ 6: 12] Notified of signal 23 D0713 05:28:08.532183 700059 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 05:28:08.532740 700059 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.532784 700059 usertrap_amd64.go:106] [ 1004: 1004] Map a usertrap vma at 62000 D0713 05:28:08.532887 700059 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0004e8450 1 D0713 05:28:08.532926 700059 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:08.533484 700059 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.533507 700059 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0004e8450 2 D0713 05:28:08.533520 700059 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:08.534241 700059 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.534271 700059 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0004e8450 3 D0713 05:28:08.534284 700059 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:08.542143 700059 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.542182 700059 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0004e8450 4 D0713 05:28:08.542196 700059 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:08.543623 700059 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.543653 700059 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0004e8450 5 D0713 05:28:08.543664 700059 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:08.543722 700059 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.543739 700059 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0004e8450 6 D0713 05:28:08.543748 700059 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:08.544269 700059 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.544292 700059 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0004e8450 7 D0713 05:28:08.544304 700059 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:08.544607 700059 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.544633 700059 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc0004e8450 8 D0713 05:28:08.544648 700059 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:08.544888 700059 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.544913 700059 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc0004e8450 9 D0713 05:28:08.544925 700059 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:08.545146 700059 usertrap_amd64.go:212] [ 1004: 1007] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.545171 700059 usertrap_amd64.go:122] [ 1004: 1007] Allocate a new trap: 0xc0004e8450 10 D0713 05:28:08.545181 700059 usertrap_amd64.go:225] [ 1004: 1007] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:08.545206 700059 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.545214 700059 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0004e8450 11 D0713 05:28:08.545222 700059 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:08.545739 700059 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.545755 700059 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc0004e8450 12 D0713 05:28:08.545768 700059 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:08.545811 700059 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.545820 700059 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc0004e8450 13 D0713 05:28:08.545828 700059 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:08.545848 700059 task_signals.go:470] [ 1004: 1004] Notified of signal 23 D0713 05:28:08.545884 700059 task_signals.go:220] [ 1004: 1004] Signal 23: delivering to handler D0713 05:28:08.546566 700059 task_signals.go:470] [ 1004: 1004] Notified of signal 23 D0713 05:28:08.546671 700059 task_signals.go:220] [ 1004: 1004] Signal 23: delivering to handler D0713 05:28:08.553578 700059 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.553613 700059 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0004e8450 14 D0713 05:28:08.553627 700059 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46af29 trap addr 62460 ([184 37 1 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:08.557316 700059 task_signals.go:470] [ 1004: 1004] Notified of signal 23 D0713 05:28:08.557364 700059 task_signals.go:220] [ 1004: 1004] Signal 23: delivering to handler D0713 05:28:08.563009 700059 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.563049 700059 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0004e8450 15 D0713 05:28:08.563064 700059 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 05:28:08.563121 700059 task_exit.go:204] [ 1004: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.563164 700059 task_exit.go:204] [ 1004: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.563189 700059 task_signals.go:204] [ 1004: 1008] Signal 1004, PID: 1008, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.563202 700059 task_signals.go:204] [ 1004: 1006] Signal 1004, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.563212 700059 task_exit.go:204] [ 1004: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.563178 700059 task_signals.go:204] [ 1004: 1007] Signal 1004, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.563222 700059 task_exit.go:204] [ 1004: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.563227 700059 task_exit.go:204] [ 1004: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.563238 700059 task_exit.go:204] [ 1004: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.563272 700059 task_exit.go:204] [ 1004: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.563286 700059 task_exit.go:204] [ 1004: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.563310 700059 task_exit.go:204] [ 1004: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.563345 700059 task_exit.go:204] [ 1004: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.563352 700059 task_exit.go:204] [ 1004: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.563314 700059 task_signals.go:204] [ 1004: 1005] Signal 1004, PID: 1005, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.563370 700059 task_exit.go:204] [ 1004: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.564287 700059 task_exit.go:204] [ 1004: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.564308 700059 task_exit.go:204] [ 1004: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.564323 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.564359 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:08.564375 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.564590 700059 task_exit.go:204] [ 1004: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.565344 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.566488 700059 syscalls.go:262] [ 1009: 1009] Allocating stack with size of 8388608 bytes D0713 05:28:08.566604 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.567516 700059 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.567557 700059 usertrap_amd64.go:106] [ 1009: 1009] Map a usertrap vma at 63000 D0713 05:28:08.567655 700059 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0004e86f0 1 D0713 05:28:08.567699 700059 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:08.568015 700059 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.568038 700059 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0004e86f0 2 D0713 05:28:08.568051 700059 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:08.568711 700059 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.568742 700059 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0004e86f0 3 D0713 05:28:08.568755 700059 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:08.578414 700059 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.578521 700059 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0004e86f0 4 D0713 05:28:08.578554 700059 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:08.579818 700059 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.579848 700059 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0004e86f0 5 D0713 05:28:08.579861 700059 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:08.579930 700059 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.579940 700059 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0004e86f0 6 D0713 05:28:08.579950 700059 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:08.580222 700059 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.580254 700059 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0004e86f0 7 D0713 05:28:08.580269 700059 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:08.580511 700059 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.580539 700059 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0004e86f0 8 D0713 05:28:08.580552 700059 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:08.580873 700059 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.580897 700059 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0004e86f0 9 D0713 05:28:08.580909 700059 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:08.580921 700059 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.580928 700059 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0004e86f0 10 D0713 05:28:08.580936 700059 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:08.591226 700059 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.591314 700059 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0004e86f0 11 D0713 05:28:08.591404 700059 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:08.591610 700059 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.591633 700059 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0004e86f0 12 D0713 05:28:08.591644 700059 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:08.591666 700059 task_signals.go:470] [ 1009: 1009] Notified of signal 23 D0713 05:28:08.591844 700059 task_signals.go:220] [ 1009: 1009] Signal 23: delivering to handler D0713 05:28:08.592460 700059 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.592486 700059 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0004e86f0 13 D0713 05:28:08.592497 700059 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:08.601428 700059 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.601457 700059 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0004e86f0 14 D0713 05:28:08.601469 700059 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:08.601544 700059 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.601560 700059 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.601596 700059 task_signals.go:204] [ 1009: 1012] Signal 1009, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.601604 700059 task_signals.go:204] [ 1009: 1011] Signal 1009, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.601628 700059 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.601634 700059 task_signals.go:204] [ 1009: 1013] Signal 1009, PID: 1013, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.601637 700059 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.601669 700059 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.601679 700059 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.601700 700059 task_signals.go:204] [ 1009: 1010] Signal 1009, PID: 1010, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.601712 700059 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.601720 700059 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.601738 700059 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.601751 700059 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.601758 700059 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.601768 700059 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.602743 700059 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.602771 700059 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.602787 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.602808 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:08.602823 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.602952 700059 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.603912 700059 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.605568 700059 syscalls.go:262] [ 1014: 1014] Allocating stack with size of 8388608 bytes D0713 05:28:08.605703 700059 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.606619 700059 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.606654 700059 usertrap_amd64.go:106] [ 1014: 1014] Map a usertrap vma at 68000 D0713 05:28:08.606756 700059 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc0015adc80 1 D0713 05:28:08.606785 700059 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:08.607070 700059 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.607089 700059 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc0015adc80 2 D0713 05:28:08.607096 700059 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:08.607770 700059 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.607799 700059 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc0015adc80 3 D0713 05:28:08.607809 700059 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:08.614922 700059 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.614957 700059 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc0015adc80 4 D0713 05:28:08.614981 700059 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:08.616203 700059 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.616232 700059 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc0015adc80 5 D0713 05:28:08.616244 700059 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:08.616303 700059 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.616318 700059 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc0015adc80 6 D0713 05:28:08.616325 700059 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:08.616625 700059 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.616649 700059 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc0015adc80 7 D0713 05:28:08.616659 700059 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:08.616823 700059 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.616838 700059 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc0015adc80 8 D0713 05:28:08.616849 700059 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:08.617095 700059 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.617117 700059 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc0015adc80 9 D0713 05:28:08.617128 700059 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:08.617264 700059 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.617295 700059 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc0015adc80 10 D0713 05:28:08.617306 700059 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:08.624012 700059 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.624043 700059 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc0015adc80 11 D0713 05:28:08.624053 700059 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:08.627783 700059 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.627831 700059 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc0015adc80 12 D0713 05:28:08.627848 700059 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:08.627917 700059 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.627933 700059 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc0015adc80 13 D0713 05:28:08.627952 700059 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:08.628010 700059 task_signals.go:470] [ 1014: 1014] Notified of signal 23 D0713 05:28:08.628074 700059 task_signals.go:220] [ 1014: 1014] Signal 23: delivering to handler D0713 05:28:08.633669 700059 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.633703 700059 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc0015adc80 14 D0713 05:28:08.633728 700059 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:08.636425 700059 task_exit.go:204] [ 1014: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.636478 700059 task_exit.go:204] [ 1014: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.636480 700059 task_signals.go:204] [ 1014: 1017] Signal 1014, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.636496 700059 task_signals.go:204] [ 1014: 1016] Signal 1014, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.636508 700059 task_signals.go:204] [ 1014: 1019] Signal 1014, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.636507 700059 task_exit.go:204] [ 1014: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.636533 700059 task_exit.go:204] [ 1014: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.636550 700059 task_exit.go:204] [ 1014: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.636568 700059 task_signals.go:204] [ 1014: 1015] Signal 1014, PID: 1015, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.636574 700059 task_exit.go:204] [ 1014: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.636587 700059 task_exit.go:204] [ 1014: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.636594 700059 task_exit.go:204] [ 1014: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.636605 700059 task_exit.go:204] [ 1014: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.636621 700059 task_exit.go:204] [ 1014: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.636638 700059 task_signals.go:204] [ 1014: 1018] Signal 1014, PID: 1018, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.636650 700059 task_exit.go:204] [ 1014: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.636706 700059 task_exit.go:204] [ 1014: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.636715 700059 task_exit.go:204] [ 1014: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.636744 700059 task_exit.go:204] [ 1014: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.636774 700059 task_exit.go:204] [ 1014: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.637709 700059 task_exit.go:204] [ 1014: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.637742 700059 task_exit.go:204] [ 1014: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.637762 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.637827 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.637874 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.637952 700059 task_exit.go:204] [ 1014: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.638770 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.640243 700059 syscalls.go:262] [ 1020: 1020] Allocating stack with size of 8388608 bytes D0713 05:28:08.640350 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.641581 700059 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.641619 700059 usertrap_amd64.go:106] [ 1020: 1020] Map a usertrap vma at 67000 D0713 05:28:08.642316 700059 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0004e8810 1 D0713 05:28:08.642362 700059 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:08.642755 700059 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.642768 700059 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0004e8810 2 D0713 05:28:08.642782 700059 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:08.643408 700059 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.643440 700059 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0004e8810 3 D0713 05:28:08.643460 700059 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:08.649337 700059 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.649370 700059 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0004e8810 4 D0713 05:28:08.649385 700059 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:08.651683 700059 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.651717 700059 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0004e8810 5 D0713 05:28:08.651731 700059 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:08.651808 700059 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.651880 700059 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0004e8810 6 D0713 05:28:08.651908 700059 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:08.652271 700059 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.652302 700059 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0004e8810 7 D0713 05:28:08.652313 700059 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:08.652486 700059 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.652509 700059 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0004e8810 8 D0713 05:28:08.652520 700059 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:08.652655 700059 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.652682 700059 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0004e8810 9 D0713 05:28:08.652695 700059 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:08.652790 700059 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.652810 700059 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0004e8810 10 D0713 05:28:08.652820 700059 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:08.652925 700059 usertrap_amd64.go:212] [ 1020: 1023] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.652981 700059 usertrap_amd64.go:122] [ 1020: 1023] Allocate a new trap: 0xc0004e8810 11 D0713 05:28:08.652995 700059 usertrap_amd64.go:225] [ 1020: 1023] Apply the binary patch addr 46b6e0 trap addr 67370 ([184 24 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:08.660365 700059 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.660399 700059 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0004e8810 12 D0713 05:28:08.660412 700059 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:08.663790 700059 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.663821 700059 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0004e8810 13 D0713 05:28:08.663842 700059 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:08.663893 700059 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.663903 700059 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0004e8810 14 D0713 05:28:08.663910 700059 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:08.663927 700059 task_signals.go:470] [ 1020: 1020] Notified of signal 23 D0713 05:28:08.664055 700059 task_signals.go:220] [ 1020: 1020] Signal 23: delivering to handler D0713 05:28:08.669775 700059 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.669806 700059 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0004e8810 15 D0713 05:28:08.669819 700059 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 05:28:08.669892 700059 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.669938 700059 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.669961 700059 task_signals.go:204] [ 1020: 1022] Signal 1020, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.669979 700059 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.669988 700059 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.669961 700059 task_signals.go:204] [ 1020: 1025] Signal 1020, PID: 1025, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.669994 700059 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.669980 700059 task_signals.go:204] [ 1020: 1021] Signal 1020, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.670004 700059 task_signals.go:204] [ 1020: 1023] Signal 1020, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.670014 700059 task_exit.go:204] [ 1020: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.670026 700059 task_signals.go:204] [ 1020: 1024] Signal 1020, PID: 1024, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.670075 700059 task_exit.go:204] [ 1020: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.670085 700059 task_exit.go:204] [ 1020: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.670096 700059 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.670105 700059 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.670111 700059 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.670119 700059 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.670134 700059 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.670140 700059 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.670148 700059 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.671189 700059 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.671225 700059 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.671242 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.671269 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.671279 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.671446 700059 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.672147 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.673654 700059 syscalls.go:262] [ 1026: 1026] Allocating stack with size of 8388608 bytes D0713 05:28:08.673771 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.675048 700059 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.675090 700059 usertrap_amd64.go:106] [ 1026: 1026] Map a usertrap vma at 69000 D0713 05:28:08.675178 700059 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0015adfb0 1 D0713 05:28:08.675200 700059 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:08.675551 700059 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.675578 700059 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0015adfb0 2 D0713 05:28:08.675596 700059 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:08.676381 700059 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.676403 700059 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0015adfb0 3 D0713 05:28:08.676432 700059 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:08.681244 700059 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.681270 700059 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0015adfb0 4 D0713 05:28:08.681278 700059 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:08.682280 700059 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.682303 700059 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0015adfb0 5 D0713 05:28:08.682311 700059 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:08.682338 700059 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.682342 700059 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0015adfb0 6 D0713 05:28:08.682367 700059 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:08.682553 700059 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.682573 700059 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0015adfb0 7 D0713 05:28:08.682583 700059 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:08.682703 700059 usertrap_amd64.go:212] [ 1026: 1027] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.682723 700059 usertrap_amd64.go:122] [ 1026: 1027] Allocate a new trap: 0xc0015adfb0 8 D0713 05:28:08.682732 700059 usertrap_amd64.go:225] [ 1026: 1027] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:08.683040 700059 usertrap_amd64.go:212] [ 1026: 1027] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.683087 700059 usertrap_amd64.go:122] [ 1026: 1027] Allocate a new trap: 0xc0015adfb0 9 D0713 05:28:08.683140 700059 usertrap_amd64.go:225] [ 1026: 1027] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:08.683251 700059 usertrap_amd64.go:212] [ 1026: 1027] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.683288 700059 usertrap_amd64.go:122] [ 1026: 1027] Allocate a new trap: 0xc0015adfb0 10 D0713 05:28:08.683396 700059 usertrap_amd64.go:225] [ 1026: 1027] Apply the binary patch addr 46b020 trap addr 69320 ([184 39 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:08.683419 700059 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.683469 700059 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0015adfb0 11 D0713 05:28:08.683476 700059 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b57c trap addr 69370 ([184 202 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:08.683490 700059 usertrap_amd64.go:212] [ 1026: 1027] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.683494 700059 usertrap_amd64.go:122] [ 1026: 1027] Allocate a new trap: 0xc0015adfb0 12 D0713 05:28:08.683499 700059 usertrap_amd64.go:225] [ 1026: 1027] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:08.683559 700059 task_signals.go:470] [ 1026: 1029] Notified of signal 23 D0713 05:28:08.683604 700059 task_signals.go:179] [ 1026: 1029] Restarting syscall 202: interrupted by signal 23 D0713 05:28:08.683633 700059 task_signals.go:220] [ 1026: 1029] Signal 23: delivering to handler D0713 05:28:08.691126 700059 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.691163 700059 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0015adfb0 13 D0713 05:28:08.691180 700059 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:08.693749 700059 task_signals.go:470] [ 1026: 1026] Notified of signal 23 D0713 05:28:08.693883 700059 task_signals.go:220] [ 1026: 1026] Signal 23: delivering to handler D0713 05:28:08.700245 700059 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.700278 700059 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0015adfb0 14 D0713 05:28:08.700291 700059 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:08.700349 700059 task_exit.go:204] [ 1026: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.700385 700059 task_exit.go:204] [ 1026: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.700407 700059 task_signals.go:204] [ 1026: 1027] Signal 1026, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.700427 700059 task_exit.go:204] [ 1026: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.700440 700059 task_exit.go:204] [ 1026: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.700444 700059 task_exit.go:204] [ 1026: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.700456 700059 task_signals.go:204] [ 1026: 1028] Signal 1026, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.700474 700059 task_exit.go:204] [ 1026: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.700502 700059 task_exit.go:204] [ 1026: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.700505 700059 task_exit.go:204] [ 1026: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.700514 700059 task_signals.go:204] [ 1026: 1029] Signal 1026, PID: 1029, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.700520 700059 task_exit.go:204] [ 1026: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.700528 700059 task_exit.go:204] [ 1026: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.700531 700059 task_exit.go:204] [ 1026: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.700541 700059 task_signals.go:204] [ 1026: 1030] Signal 1026, PID: 1030, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.700547 700059 task_exit.go:204] [ 1026: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.701413 700059 task_exit.go:204] [ 1026: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.701476 700059 task_exit.go:204] [ 1026: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.701489 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.701513 700059 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:28:08.701523 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.701612 700059 task_exit.go:204] [ 1026: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.702211 700059 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.703607 700059 syscalls.go:262] [ 1031: 1031] Allocating stack with size of 8388608 bytes D0713 05:28:08.703749 700059 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.705121 700059 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.705167 700059 usertrap_amd64.go:106] [ 1031: 1031] Map a usertrap vma at 60000 D0713 05:28:08.705243 700059 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0015692f0 1 D0713 05:28:08.705270 700059 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:08.705696 700059 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.705733 700059 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0015692f0 2 D0713 05:28:08.705748 700059 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:08.706477 700059 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.706490 700059 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0015692f0 3 D0713 05:28:08.706499 700059 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:08.712307 700059 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.712333 700059 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0015692f0 4 D0713 05:28:08.712344 700059 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:08.717087 700059 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.717174 700059 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0015692f0 5 D0713 05:28:08.717191 700059 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:08.717842 700059 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.717862 700059 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0015692f0 6 D0713 05:28:08.717896 700059 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:08.718204 700059 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.718222 700059 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0015692f0 7 D0713 05:28:08.718229 700059 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:08.718587 700059 usertrap_amd64.go:212] [ 1031: 1032] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.718612 700059 usertrap_amd64.go:122] [ 1031: 1032] Allocate a new trap: 0xc0015692f0 8 D0713 05:28:08.718622 700059 usertrap_amd64.go:225] [ 1031: 1032] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:08.718756 700059 usertrap_amd64.go:212] [ 1031: 1032] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.718785 700059 usertrap_amd64.go:122] [ 1031: 1032] Allocate a new trap: 0xc0015692f0 9 D0713 05:28:08.718798 700059 usertrap_amd64.go:225] [ 1031: 1032] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:08.718813 700059 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.718820 700059 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0015692f0 10 D0713 05:28:08.718827 700059 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:08.719020 700059 usertrap_amd64.go:212] [ 1031: 1034] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.719049 700059 usertrap_amd64.go:122] [ 1031: 1034] Allocate a new trap: 0xc0015692f0 11 D0713 05:28:08.719056 700059 usertrap_amd64.go:225] [ 1031: 1034] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:08.726002 700059 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.726030 700059 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0015692f0 12 D0713 05:28:08.726041 700059 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:08.729797 700059 usertrap_amd64.go:212] [ 1031: 1032] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.729828 700059 usertrap_amd64.go:122] [ 1031: 1032] Allocate a new trap: 0xc0015692f0 13 D0713 05:28:08.729841 700059 usertrap_amd64.go:225] [ 1031: 1032] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:08.729947 700059 usertrap_amd64.go:212] [ 1031: 1032] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.729976 700059 usertrap_amd64.go:122] [ 1031: 1032] Allocate a new trap: 0xc0015692f0 14 D0713 05:28:08.729988 700059 usertrap_amd64.go:225] [ 1031: 1032] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:08.730084 700059 task_signals.go:470] [ 1031: 1031] Notified of signal 23 D0713 05:28:08.730206 700059 task_signals.go:220] [ 1031: 1031] Signal 23: delivering to handler D0713 05:28:08.735499 700059 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.735529 700059 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0015692f0 15 D0713 05:28:08.735538 700059 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 05:28:08.735593 700059 task_exit.go:204] [ 1031: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.735609 700059 task_exit.go:204] [ 1031: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.735625 700059 task_signals.go:204] [ 1031: 1034] Signal 1031, PID: 1034, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.735626 700059 task_signals.go:204] [ 1031: 1033] Signal 1031, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.735650 700059 task_exit.go:204] [ 1031: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.735655 700059 task_exit.go:204] [ 1031: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.735659 700059 task_exit.go:204] [ 1031: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.735659 700059 task_signals.go:204] [ 1031: 1035] Signal 1031, PID: 1035, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.735683 700059 task_signals.go:204] [ 1031: 1032] Signal 1031, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.735694 700059 task_exit.go:204] [ 1031: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.735693 700059 task_signals.go:204] [ 1031: 1036] Signal 1031, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.735716 700059 task_exit.go:204] [ 1031: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.735724 700059 task_exit.go:204] [ 1031: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.735737 700059 task_exit.go:204] [ 1031: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.735746 700059 task_exit.go:204] [ 1031: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.735751 700059 task_exit.go:204] [ 1031: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.735760 700059 task_exit.go:204] [ 1031: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.735776 700059 task_exit.go:204] [ 1031: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.735781 700059 task_exit.go:204] [ 1031: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.735787 700059 task_exit.go:204] [ 1031: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.736750 700059 task_exit.go:204] [ 1031: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.736780 700059 task_exit.go:204] [ 1031: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.736796 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.736831 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.736931 700059 task_exit.go:204] [ 1031: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.737726 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.739178 700059 syscalls.go:262] [ 1037: 1037] Allocating stack with size of 8388608 bytes D0713 05:28:08.739259 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.740100 700059 usertrap_amd64.go:212] [ 1037: 1037] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.740132 700059 usertrap_amd64.go:106] [ 1037: 1037] Map a usertrap vma at 65000 D0713 05:28:08.740380 700059 usertrap_amd64.go:122] [ 1037: 1037] Allocate a new trap: 0xc001ed1c50 1 D0713 05:28:08.740414 700059 usertrap_amd64.go:225] [ 1037: 1037] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:08.740681 700059 usertrap_amd64.go:212] [ 1037: 1037] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.740715 700059 usertrap_amd64.go:122] [ 1037: 1037] Allocate a new trap: 0xc001ed1c50 2 D0713 05:28:08.740728 700059 usertrap_amd64.go:225] [ 1037: 1037] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:08.741429 700059 usertrap_amd64.go:212] [ 1037: 1037] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.741461 700059 usertrap_amd64.go:122] [ 1037: 1037] Allocate a new trap: 0xc001ed1c50 3 D0713 05:28:08.741470 700059 usertrap_amd64.go:225] [ 1037: 1037] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:08.747169 700059 usertrap_amd64.go:212] [ 1037: 1037] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.747198 700059 usertrap_amd64.go:122] [ 1037: 1037] Allocate a new trap: 0xc001ed1c50 4 D0713 05:28:08.747206 700059 usertrap_amd64.go:225] [ 1037: 1037] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:08.748265 700059 usertrap_amd64.go:212] [ 1037: 1037] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.748294 700059 usertrap_amd64.go:122] [ 1037: 1037] Allocate a new trap: 0xc001ed1c50 5 D0713 05:28:08.748304 700059 usertrap_amd64.go:225] [ 1037: 1037] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:08.748353 700059 usertrap_amd64.go:212] [ 1037: 1037] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.748363 700059 usertrap_amd64.go:122] [ 1037: 1037] Allocate a new trap: 0xc001ed1c50 6 D0713 05:28:08.748374 700059 usertrap_amd64.go:225] [ 1037: 1037] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:08.748539 700059 usertrap_amd64.go:212] [ 1037: 1037] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.748555 700059 usertrap_amd64.go:122] [ 1037: 1037] Allocate a new trap: 0xc001ed1c50 7 D0713 05:28:08.748560 700059 usertrap_amd64.go:225] [ 1037: 1037] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:08.748639 700059 usertrap_amd64.go:212] [ 1037: 1038] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.748649 700059 usertrap_amd64.go:122] [ 1037: 1038] Allocate a new trap: 0xc001ed1c50 8 D0713 05:28:08.748658 700059 usertrap_amd64.go:225] [ 1037: 1038] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:08.748806 700059 usertrap_amd64.go:212] [ 1037: 1037] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.748833 700059 usertrap_amd64.go:122] [ 1037: 1037] Allocate a new trap: 0xc001ed1c50 9 D0713 05:28:08.748847 700059 usertrap_amd64.go:225] [ 1037: 1037] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:08.748861 700059 usertrap_amd64.go:212] [ 1037: 1038] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.748878 700059 usertrap_amd64.go:122] [ 1037: 1038] Allocate a new trap: 0xc001ed1c50 10 D0713 05:28:08.748886 700059 usertrap_amd64.go:225] [ 1037: 1038] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:08.755372 700059 usertrap_amd64.go:212] [ 1037: 1037] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.755399 700059 usertrap_amd64.go:122] [ 1037: 1037] Allocate a new trap: 0xc001ed1c50 11 D0713 05:28:08.755409 700059 usertrap_amd64.go:225] [ 1037: 1037] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:08.759168 700059 usertrap_amd64.go:212] [ 1037: 1038] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.759258 700059 usertrap_amd64.go:122] [ 1037: 1038] Allocate a new trap: 0xc001ed1c50 12 D0713 05:28:08.759277 700059 usertrap_amd64.go:225] [ 1037: 1038] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:08.759291 700059 usertrap_amd64.go:212] [ 1037: 1037] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.759298 700059 usertrap_amd64.go:122] [ 1037: 1037] Allocate a new trap: 0xc001ed1c50 13 D0713 05:28:08.759306 700059 usertrap_amd64.go:225] [ 1037: 1037] Apply the binary patch addr 46b6e0 trap addr 65410 ([184 24 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:08.759361 700059 usertrap_amd64.go:212] [ 1037: 1038] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.759386 700059 usertrap_amd64.go:122] [ 1037: 1038] Allocate a new trap: 0xc001ed1c50 14 D0713 05:28:08.759395 700059 usertrap_amd64.go:225] [ 1037: 1038] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:08.759489 700059 task_signals.go:470] [ 1037: 1037] Notified of signal 23 D0713 05:28:08.759608 700059 task_signals.go:220] [ 1037: 1037] Signal 23: delivering to handler I0713 05:28:08.764312 700059 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0713 05:28:08.764442 700059 usertrap_amd64.go:212] [ 1037: 1037] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.764460 700059 usertrap_amd64.go:122] [ 1037: 1037] Allocate a new trap: 0xc001ed1c50 15 D0713 05:28:08.764474 700059 usertrap_amd64.go:225] [ 1037: 1037] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 05:28:08.764549 700059 task_exit.go:204] [ 1037: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.764581 700059 task_exit.go:204] [ 1037: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.764609 700059 task_signals.go:204] [ 1037: 1038] Signal 1037, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.764632 700059 task_exit.go:204] [ 1037: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.764641 700059 task_exit.go:204] [ 1037: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.764647 700059 task_exit.go:204] [ 1037: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.764674 700059 task_signals.go:204] [ 1037: 1039] Signal 1037, PID: 1039, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.764694 700059 task_exit.go:204] [ 1037: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.764702 700059 task_exit.go:204] [ 1037: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.764707 700059 task_exit.go:204] [ 1037: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.764722 700059 task_signals.go:204] [ 1037: 1040] Signal 1037, PID: 1040, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.764741 700059 task_exit.go:204] [ 1037: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.764749 700059 task_exit.go:204] [ 1037: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.764755 700059 task_exit.go:204] [ 1037: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.764770 700059 task_signals.go:204] [ 1037: 1041] Signal 1037, PID: 1041, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.764788 700059 task_exit.go:204] [ 1037: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.764802 700059 task_exit.go:204] [ 1037: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.764808 700059 task_exit.go:204] [ 1037: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.764820 700059 task_signals.go:204] [ 1037: 1042] Signal 1037, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.764837 700059 task_exit.go:204] [ 1037: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.765805 700059 task_exit.go:204] [ 1037: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.765842 700059 task_exit.go:204] [ 1037: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.765858 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.765940 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:08.765959 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.766061 700059 task_exit.go:204] [ 1037: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.766658 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.768250 700059 syscalls.go:262] [ 1043: 1043] Allocating stack with size of 8388608 bytes D0713 05:28:08.768358 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.769331 700059 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.769369 700059 usertrap_amd64.go:106] [ 1043: 1043] Map a usertrap vma at 64000 D0713 05:28:08.769475 700059 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc000318390 1 D0713 05:28:08.769505 700059 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:08.769932 700059 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.769987 700059 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc000318390 2 D0713 05:28:08.770000 700059 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:08.770691 700059 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.770709 700059 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc000318390 3 D0713 05:28:08.770716 700059 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:08.776376 700059 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.776401 700059 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc000318390 4 D0713 05:28:08.776410 700059 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:08.777597 700059 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.777616 700059 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc000318390 5 D0713 05:28:08.777628 700059 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:08.777682 700059 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.777701 700059 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc000318390 6 D0713 05:28:08.777708 700059 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:08.777941 700059 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.777975 700059 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc000318390 7 D0713 05:28:08.777989 700059 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:08.778226 700059 usertrap_amd64.go:212] [ 1043: 1044] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.778252 700059 usertrap_amd64.go:122] [ 1043: 1044] Allocate a new trap: 0xc000318390 8 D0713 05:28:08.778267 700059 usertrap_amd64.go:225] [ 1043: 1044] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:08.778539 700059 usertrap_amd64.go:212] [ 1043: 1044] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.778567 700059 usertrap_amd64.go:122] [ 1043: 1044] Allocate a new trap: 0xc000318390 9 D0713 05:28:08.778581 700059 usertrap_amd64.go:225] [ 1043: 1044] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:08.778630 700059 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.778655 700059 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc000318390 10 D0713 05:28:08.778665 700059 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:08.785036 700059 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.785065 700059 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc000318390 11 D0713 05:28:08.785076 700059 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:08.790077 700059 usertrap_amd64.go:212] [ 1043: 1044] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.790101 700059 usertrap_amd64.go:122] [ 1043: 1044] Allocate a new trap: 0xc000318390 12 D0713 05:28:08.790110 700059 usertrap_amd64.go:225] [ 1043: 1044] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:08.790164 700059 usertrap_amd64.go:212] [ 1043: 1044] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.790169 700059 usertrap_amd64.go:122] [ 1043: 1044] Allocate a new trap: 0xc000318390 13 D0713 05:28:08.790174 700059 usertrap_amd64.go:225] [ 1043: 1044] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:08.790236 700059 task_signals.go:470] [ 1043: 1043] Notified of signal 23 D0713 05:28:08.790301 700059 task_signals.go:220] [ 1043: 1043] Signal 23: delivering to handler I0713 05:28:08.793563 700059 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0713 05:28:08.793626 700059 usertrap_amd64.go:212] [ 1043: 1043] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.793651 700059 usertrap_amd64.go:122] [ 1043: 1043] Allocate a new trap: 0xc000318390 14 D0713 05:28:08.793660 700059 usertrap_amd64.go:225] [ 1043: 1043] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:08.793712 700059 task_exit.go:204] [ 1043: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.793735 700059 task_exit.go:204] [ 1043: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.793752 700059 task_signals.go:204] [ 1043: 1044] Signal 1043, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.793769 700059 task_exit.go:204] [ 1043: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.793774 700059 task_exit.go:204] [ 1043: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.793778 700059 task_exit.go:204] [ 1043: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.793793 700059 task_signals.go:204] [ 1043: 1045] Signal 1043, PID: 1045, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.793800 700059 task_exit.go:204] [ 1043: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.793805 700059 task_exit.go:204] [ 1043: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.793820 700059 task_exit.go:204] [ 1043: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.793836 700059 task_signals.go:204] [ 1043: 1046] Signal 1043, PID: 1046, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.793849 700059 task_exit.go:204] [ 1043: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.793859 700059 task_exit.go:204] [ 1043: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.793866 700059 task_exit.go:204] [ 1043: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.793891 700059 task_signals.go:204] [ 1043: 1047] Signal 1043, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.793899 700059 task_exit.go:204] [ 1043: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.794729 700059 task_exit.go:204] [ 1043: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.794749 700059 task_exit.go:204] [ 1043: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.794758 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.794784 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:08.794793 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.794938 700059 task_exit.go:204] [ 1043: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.795050 700059 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 05:28:08.795152 700059 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 05:28:08.795674 700059 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.796916 700059 syscalls.go:262] [ 1048: 1048] Allocating stack with size of 8388608 bytes D0713 05:28:08.797038 700059 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.797675 700059 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.797708 700059 usertrap_amd64.go:106] [ 1048: 1048] Map a usertrap vma at 69000 D0713 05:28:08.797763 700059 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004e8f00 1 D0713 05:28:08.797783 700059 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:08.798111 700059 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.798125 700059 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004e8f00 2 D0713 05:28:08.798135 700059 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:08.798429 700059 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.798438 700059 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004e8f00 3 D0713 05:28:08.798445 700059 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:08.803101 700059 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.803129 700059 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004e8f00 4 D0713 05:28:08.803138 700059 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:08.804397 700059 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.804408 700059 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004e8f00 5 D0713 05:28:08.804418 700059 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:08.804432 700059 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.804436 700059 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004e8f00 6 D0713 05:28:08.804441 700059 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:08.804815 700059 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.804845 700059 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004e8f00 7 D0713 05:28:08.804858 700059 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:08.805086 700059 usertrap_amd64.go:212] [ 1048: 1049] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.805114 700059 usertrap_amd64.go:122] [ 1048: 1049] Allocate a new trap: 0xc0004e8f00 8 D0713 05:28:08.805125 700059 usertrap_amd64.go:225] [ 1048: 1049] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:08.805311 700059 usertrap_amd64.go:212] [ 1048: 1049] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.805338 700059 usertrap_amd64.go:122] [ 1048: 1049] Allocate a new trap: 0xc0004e8f00 9 D0713 05:28:08.805352 700059 usertrap_amd64.go:225] [ 1048: 1049] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:08.805423 700059 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.805451 700059 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004e8f00 10 D0713 05:28:08.805462 700059 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:08.812413 700059 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.812447 700059 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004e8f00 11 D0713 05:28:08.812460 700059 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:08.815987 700059 usertrap_amd64.go:212] [ 1048: 1049] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.816018 700059 usertrap_amd64.go:122] [ 1048: 1049] Allocate a new trap: 0xc0004e8f00 12 D0713 05:28:08.816031 700059 usertrap_amd64.go:225] [ 1048: 1049] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:08.816095 700059 usertrap_amd64.go:212] [ 1048: 1049] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.816134 700059 usertrap_amd64.go:122] [ 1048: 1049] Allocate a new trap: 0xc0004e8f00 13 D0713 05:28:08.816157 700059 usertrap_amd64.go:225] [ 1048: 1049] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:08.816211 700059 task_signals.go:470] [ 1048: 1048] Notified of signal 23 D0713 05:28:08.816285 700059 task_signals.go:220] [ 1048: 1048] Signal 23: delivering to handler I0713 05:28:08.821140 700059 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0713 05:28:08.821208 700059 usertrap_amd64.go:212] [ 1048: 1048] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.821218 700059 usertrap_amd64.go:122] [ 1048: 1048] Allocate a new trap: 0xc0004e8f00 14 D0713 05:28:08.821227 700059 usertrap_amd64.go:225] [ 1048: 1048] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:08.821259 700059 task_exit.go:204] [ 1048: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.821278 700059 task_exit.go:204] [ 1048: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.821292 700059 task_signals.go:204] [ 1048: 1050] Signal 1048, PID: 1050, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.821312 700059 task_exit.go:204] [ 1048: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.821346 700059 task_exit.go:204] [ 1048: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.821353 700059 task_exit.go:204] [ 1048: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.821348 700059 task_signals.go:204] [ 1048: 1053] Signal 1048, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.821297 700059 task_signals.go:204] [ 1048: 1051] Signal 1048, PID: 1051, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.821315 700059 task_signals.go:204] [ 1048: 1049] Signal 1048, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.821311 700059 task_signals.go:204] [ 1048: 1052] Signal 1048, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.821365 700059 task_exit.go:204] [ 1048: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.821395 700059 task_exit.go:204] [ 1048: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.821416 700059 task_exit.go:204] [ 1048: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.821443 700059 task_exit.go:204] [ 1048: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.821458 700059 task_exit.go:204] [ 1048: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.821462 700059 task_exit.go:204] [ 1048: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.821479 700059 task_exit.go:204] [ 1048: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.821485 700059 task_exit.go:204] [ 1048: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.821490 700059 task_exit.go:204] [ 1048: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.821505 700059 task_exit.go:204] [ 1048: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.822408 700059 task_exit.go:204] [ 1048: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.822451 700059 task_exit.go:204] [ 1048: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.822463 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.822493 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.822537 700059 task_exit.go:204] [ 1048: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.823157 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.824579 700059 syscalls.go:262] [ 1054: 1054] Allocating stack with size of 8388608 bytes D0713 05:28:08.824673 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.825686 700059 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.825718 700059 usertrap_amd64.go:106] [ 1054: 1054] Map a usertrap vma at 66000 D0713 05:28:08.825786 700059 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000d32000 1 D0713 05:28:08.825816 700059 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:08.826252 700059 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.826270 700059 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000d32000 2 D0713 05:28:08.826279 700059 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:08.826872 700059 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.826895 700059 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000d32000 3 D0713 05:28:08.826902 700059 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:08.831998 700059 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.832031 700059 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000d32000 4 D0713 05:28:08.832044 700059 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:08.833113 700059 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.833141 700059 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000d32000 5 D0713 05:28:08.833153 700059 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:08.833206 700059 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.833211 700059 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000d32000 6 D0713 05:28:08.833216 700059 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:08.833375 700059 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.833396 700059 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000d32000 7 D0713 05:28:08.833401 700059 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:08.833495 700059 usertrap_amd64.go:212] [ 1054: 1055] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.833516 700059 usertrap_amd64.go:122] [ 1054: 1055] Allocate a new trap: 0xc000d32000 8 D0713 05:28:08.833525 700059 usertrap_amd64.go:225] [ 1054: 1055] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:08.833760 700059 usertrap_amd64.go:212] [ 1054: 1056] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.833787 700059 usertrap_amd64.go:122] [ 1054: 1056] Allocate a new trap: 0xc000d32000 9 D0713 05:28:08.833797 700059 usertrap_amd64.go:225] [ 1054: 1056] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:08.833831 700059 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.833848 700059 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000d32000 10 D0713 05:28:08.833877 700059 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:08.841137 700059 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.841169 700059 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000d32000 11 D0713 05:28:08.841182 700059 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:08.845153 700059 usertrap_amd64.go:212] [ 1054: 1055] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.845191 700059 usertrap_amd64.go:122] [ 1054: 1055] Allocate a new trap: 0xc000d32000 12 D0713 05:28:08.845206 700059 usertrap_amd64.go:225] [ 1054: 1055] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:08.845257 700059 usertrap_amd64.go:212] [ 1054: 1055] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.845265 700059 usertrap_amd64.go:122] [ 1054: 1055] Allocate a new trap: 0xc000d32000 13 D0713 05:28:08.845275 700059 usertrap_amd64.go:225] [ 1054: 1055] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:08.845320 700059 task_signals.go:470] [ 1054: 1054] Notified of signal 23 D0713 05:28:08.845384 700059 task_signals.go:220] [ 1054: 1054] Signal 23: delivering to handler I0713 05:28:08.850907 700059 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0713 05:28:08.851002 700059 usertrap_amd64.go:212] [ 1054: 1054] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.851015 700059 usertrap_amd64.go:122] [ 1054: 1054] Allocate a new trap: 0xc000d32000 14 D0713 05:28:08.851026 700059 usertrap_amd64.go:225] [ 1054: 1054] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:08.851086 700059 task_exit.go:204] [ 1054: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.851117 700059 task_exit.go:204] [ 1054: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.851120 700059 task_signals.go:204] [ 1054: 1055] Signal 1054, PID: 1055, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.851145 700059 task_exit.go:204] [ 1054: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.851147 700059 task_signals.go:204] [ 1054: 1056] Signal 1054, PID: 1056, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.851157 700059 task_exit.go:204] [ 1054: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.851133 700059 task_signals.go:204] [ 1054: 1058] Signal 1054, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.851163 700059 task_exit.go:204] [ 1054: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.851141 700059 task_signals.go:204] [ 1054: 1057] Signal 1054, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.851184 700059 task_exit.go:204] [ 1054: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.851197 700059 task_exit.go:204] [ 1054: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.851202 700059 task_exit.go:204] [ 1054: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.851209 700059 task_exit.go:204] [ 1054: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.851215 700059 task_exit.go:204] [ 1054: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.851218 700059 task_exit.go:204] [ 1054: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.851225 700059 task_exit.go:204] [ 1054: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.852299 700059 task_exit.go:204] [ 1054: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.852327 700059 task_exit.go:204] [ 1054: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.852337 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.852363 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:08.852370 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.852553 700059 task_exit.go:204] [ 1054: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.853170 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.854556 700059 syscalls.go:262] [ 1059: 1059] Allocating stack with size of 8388608 bytes D0713 05:28:08.854655 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.855513 700059 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.855549 700059 usertrap_amd64.go:106] [ 1059: 1059] Map a usertrap vma at 67000 D0713 05:28:08.855670 700059 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc001a41c20 1 D0713 05:28:08.855700 700059 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:08.855986 700059 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.856009 700059 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc001a41c20 2 D0713 05:28:08.856019 700059 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:08.856372 700059 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.856392 700059 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc001a41c20 3 D0713 05:28:08.856399 700059 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:08.861591 700059 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.861622 700059 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc001a41c20 4 D0713 05:28:08.861638 700059 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:08.862747 700059 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.862781 700059 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc001a41c20 5 D0713 05:28:08.862804 700059 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:08.862840 700059 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.862861 700059 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc001a41c20 6 D0713 05:28:08.862870 700059 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:08.863106 700059 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.863132 700059 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc001a41c20 7 D0713 05:28:08.863141 700059 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:08.863266 700059 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.863284 700059 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc001a41c20 8 D0713 05:28:08.863293 700059 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:08.863456 700059 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.863478 700059 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc001a41c20 9 D0713 05:28:08.863486 700059 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:08.863518 700059 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.863526 700059 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc001a41c20 10 D0713 05:28:08.863536 700059 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:08.869440 700059 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.869466 700059 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc001a41c20 11 D0713 05:28:08.869477 700059 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:08.873963 700059 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.873997 700059 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc001a41c20 12 D0713 05:28:08.874010 700059 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:08.874057 700059 usertrap_amd64.go:212] [ 1059: 1060] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.874069 700059 usertrap_amd64.go:122] [ 1059: 1060] Allocate a new trap: 0xc001a41c20 13 D0713 05:28:08.874083 700059 usertrap_amd64.go:225] [ 1059: 1060] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:08.874102 700059 task_signals.go:470] [ 1059: 1059] Notified of signal 23 D0713 05:28:08.874199 700059 task_signals.go:220] [ 1059: 1059] Signal 23: delivering to handler D0713 05:28:08.879554 700059 usertrap_amd64.go:212] [ 1059: 1059] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.879580 700059 usertrap_amd64.go:122] [ 1059: 1059] Allocate a new trap: 0xc001a41c20 14 D0713 05:28:08.879589 700059 usertrap_amd64.go:225] [ 1059: 1059] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:08.879639 700059 task_exit.go:204] [ 1059: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.879663 700059 task_exit.go:204] [ 1059: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.879676 700059 task_signals.go:204] [ 1059: 1060] Signal 1059, PID: 1060, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.879696 700059 task_signals.go:204] [ 1059: 1063] Signal 1059, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.879699 700059 task_exit.go:204] [ 1059: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.879701 700059 task_signals.go:204] [ 1059: 1061] Signal 1059, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.879713 700059 task_exit.go:204] [ 1059: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.879720 700059 task_exit.go:204] [ 1059: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.879682 700059 task_signals.go:204] [ 1059: 1062] Signal 1059, PID: 1062, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.879731 700059 task_exit.go:204] [ 1059: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.879738 700059 task_exit.go:204] [ 1059: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.879744 700059 task_exit.go:204] [ 1059: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.879750 700059 task_exit.go:204] [ 1059: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.879768 700059 task_exit.go:204] [ 1059: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.879771 700059 task_exit.go:204] [ 1059: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.879778 700059 task_exit.go:204] [ 1059: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.880585 700059 task_exit.go:204] [ 1059: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.880622 700059 task_exit.go:204] [ 1059: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.880634 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.880673 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:08.880693 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.880785 700059 task_exit.go:204] [ 1059: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.881259 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.882682 700059 syscalls.go:262] [ 1064: 1064] Allocating stack with size of 8388608 bytes D0713 05:28:08.882767 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.884929 700059 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.885000 700059 usertrap_amd64.go:106] [ 1064: 1064] Map a usertrap vma at 68000 D0713 05:28:08.885098 700059 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc000318570 1 D0713 05:28:08.885118 700059 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:08.885973 700059 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.886003 700059 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc000318570 2 D0713 05:28:08.886013 700059 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:08.886696 700059 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.886716 700059 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc000318570 3 D0713 05:28:08.886724 700059 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:08.892133 700059 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.892156 700059 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc000318570 4 D0713 05:28:08.892165 700059 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:08.893340 700059 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.893364 700059 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc000318570 5 D0713 05:28:08.893375 700059 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:08.893436 700059 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.893454 700059 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc000318570 6 D0713 05:28:08.893460 700059 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:08.893749 700059 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.893772 700059 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc000318570 7 D0713 05:28:08.893782 700059 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:08.893943 700059 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.893968 700059 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc000318570 8 D0713 05:28:08.893978 700059 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:08.894116 700059 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.894138 700059 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc000318570 9 D0713 05:28:08.894147 700059 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:08.894293 700059 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.894315 700059 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc000318570 10 D0713 05:28:08.894326 700059 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:08.894514 700059 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.894538 700059 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc000318570 11 D0713 05:28:08.894547 700059 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:08.894559 700059 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.894564 700059 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc000318570 12 D0713 05:28:08.894570 700059 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:08.894581 700059 task_signals.go:470] [ 1064: 1067] Notified of signal 23 D0713 05:28:08.894673 700059 task_signals.go:220] [ 1064: 1067] Signal 23: delivering to handler D0713 05:28:08.901578 700059 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.901605 700059 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc000318570 13 D0713 05:28:08.901615 700059 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:08.905034 700059 task_signals.go:470] [ 1064: 1064] Notified of signal 23 D0713 05:28:08.905129 700059 task_signals.go:220] [ 1064: 1064] Signal 23: delivering to handler D0713 05:28:08.910628 700059 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.910658 700059 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc000318570 14 D0713 05:28:08.910673 700059 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:08.910742 700059 task_exit.go:204] [ 1064: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.910760 700059 task_exit.go:204] [ 1064: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.910780 700059 task_signals.go:204] [ 1064: 1067] Signal 1064, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.910777 700059 task_signals.go:204] [ 1064: 1066] Signal 1064, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.910800 700059 task_signals.go:204] [ 1064: 1065] Signal 1064, PID: 1065, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.910821 700059 task_exit.go:204] [ 1064: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.910867 700059 task_signals.go:204] [ 1064: 1068] Signal 1064, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.910903 700059 task_exit.go:204] [ 1064: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.910913 700059 task_exit.go:204] [ 1064: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.910934 700059 task_exit.go:204] [ 1064: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.910952 700059 task_exit.go:204] [ 1064: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.910960 700059 task_exit.go:204] [ 1064: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.910969 700059 task_exit.go:204] [ 1064: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.910985 700059 task_exit.go:204] [ 1064: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.910992 700059 task_exit.go:204] [ 1064: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.911003 700059 task_exit.go:204] [ 1064: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.912011 700059 task_exit.go:204] [ 1064: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.912043 700059 task_exit.go:204] [ 1064: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.912064 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.912098 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:08.912110 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.912303 700059 task_exit.go:204] [ 1064: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.913192 700059 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.914930 700059 syscalls.go:262] [ 1069: 1069] Allocating stack with size of 8388608 bytes D0713 05:28:08.915203 700059 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.916598 700059 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.916639 700059 usertrap_amd64.go:106] [ 1069: 1069] Map a usertrap vma at 60000 D0713 05:28:08.916746 700059 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001a41e90 1 D0713 05:28:08.916771 700059 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:08.917223 700059 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.917250 700059 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001a41e90 2 D0713 05:28:08.917262 700059 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:08.918108 700059 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.918144 700059 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001a41e90 3 D0713 05:28:08.918158 700059 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:08.924769 700059 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.924804 700059 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001a41e90 4 D0713 05:28:08.924815 700059 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:08.926094 700059 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.926139 700059 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001a41e90 5 D0713 05:28:08.926159 700059 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:08.926223 700059 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.926245 700059 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001a41e90 6 D0713 05:28:08.926254 700059 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:08.926569 700059 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.926596 700059 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001a41e90 7 D0713 05:28:08.926605 700059 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:08.926764 700059 usertrap_amd64.go:212] [ 1069: 1070] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.926793 700059 usertrap_amd64.go:122] [ 1069: 1070] Allocate a new trap: 0xc001a41e90 8 D0713 05:28:08.926804 700059 usertrap_amd64.go:225] [ 1069: 1070] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:08.926957 700059 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.926982 700059 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001a41e90 9 D0713 05:28:08.926995 700059 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:08.927012 700059 usertrap_amd64.go:212] [ 1069: 1070] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.927019 700059 usertrap_amd64.go:122] [ 1069: 1070] Allocate a new trap: 0xc001a41e90 10 D0713 05:28:08.927105 700059 usertrap_amd64.go:225] [ 1069: 1070] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:08.927160 700059 usertrap_amd64.go:212] [ 1069: 1072] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.927170 700059 usertrap_amd64.go:122] [ 1069: 1072] Allocate a new trap: 0xc001a41e90 11 D0713 05:28:08.927178 700059 usertrap_amd64.go:225] [ 1069: 1072] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:08.933787 700059 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.933820 700059 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001a41e90 12 D0713 05:28:08.933832 700059 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:08.937770 700059 usertrap_amd64.go:212] [ 1069: 1070] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.937789 700059 usertrap_amd64.go:122] [ 1069: 1070] Allocate a new trap: 0xc001a41e90 13 D0713 05:28:08.937801 700059 usertrap_amd64.go:225] [ 1069: 1070] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:08.937846 700059 usertrap_amd64.go:212] [ 1069: 1070] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.937854 700059 usertrap_amd64.go:122] [ 1069: 1070] Allocate a new trap: 0xc001a41e90 14 D0713 05:28:08.937862 700059 usertrap_amd64.go:225] [ 1069: 1070] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:08.937879 700059 task_signals.go:470] [ 1069: 1069] Notified of signal 23 D0713 05:28:08.937926 700059 task_signals.go:220] [ 1069: 1069] Signal 23: delivering to handler D0713 05:28:08.943094 700059 usertrap_amd64.go:212] [ 1069: 1069] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.943121 700059 usertrap_amd64.go:122] [ 1069: 1069] Allocate a new trap: 0xc001a41e90 15 D0713 05:28:08.943132 700059 usertrap_amd64.go:225] [ 1069: 1069] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 05:28:08.943154 700059 task_exit.go:204] [ 1069: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.943171 700059 task_exit.go:204] [ 1069: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.943195 700059 task_signals.go:204] [ 1069: 1072] Signal 1069, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.943206 700059 task_exit.go:204] [ 1069: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.943212 700059 task_exit.go:204] [ 1069: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.943216 700059 task_exit.go:204] [ 1069: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.943229 700059 task_signals.go:204] [ 1069: 1073] Signal 1069, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.943205 700059 task_signals.go:204] [ 1069: 1071] Signal 1069, PID: 1071, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.943250 700059 task_exit.go:204] [ 1069: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.943299 700059 task_exit.go:204] [ 1069: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.943321 700059 task_exit.go:204] [ 1069: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.943362 700059 task_signals.go:204] [ 1069: 1074] Signal 1069, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.943379 700059 task_exit.go:204] [ 1069: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.943392 700059 task_exit.go:204] [ 1069: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.943399 700059 task_exit.go:204] [ 1069: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.943413 700059 task_exit.go:204] [ 1069: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.943424 700059 task_exit.go:204] [ 1069: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.943442 700059 task_exit.go:204] [ 1069: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.943475 700059 task_signals.go:204] [ 1069: 1070] Signal 1069, PID: 1070, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.943498 700059 task_exit.go:204] [ 1069: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.944661 700059 task_exit.go:204] [ 1069: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.944707 700059 task_exit.go:204] [ 1069: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.944737 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.944791 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.944881 700059 task_exit.go:204] [ 1069: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.945702 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.947287 700059 syscalls.go:262] [ 1075: 1075] Allocating stack with size of 8388608 bytes D0713 05:28:08.947419 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.949079 700059 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.949125 700059 usertrap_amd64.go:106] [ 1075: 1075] Map a usertrap vma at 61000 D0713 05:28:08.949245 700059 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc0004e9470 1 D0713 05:28:08.949282 700059 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:08.949907 700059 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.949972 700059 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc0004e9470 2 D0713 05:28:08.950008 700059 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:08.950916 700059 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.950953 700059 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc0004e9470 3 D0713 05:28:08.950972 700059 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:08.960050 700059 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:08.960108 700059 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc0004e9470 4 D0713 05:28:08.960128 700059 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:08.961354 700059 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:08.961398 700059 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc0004e9470 5 D0713 05:28:08.961410 700059 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:08.961474 700059 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b214:sysno 13 D0713 05:28:08.961479 700059 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc0004e9470 6 D0713 05:28:08.961485 700059 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:08.961883 700059 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:08.961902 700059 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc0004e9470 7 D0713 05:28:08.961912 700059 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:08.962175 700059 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:08.962202 700059 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc0004e9470 8 D0713 05:28:08.962214 700059 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:08.962406 700059 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46af76:sysno 35 D0713 05:28:08.962448 700059 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc0004e9470 9 D0713 05:28:08.962467 700059 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:08.962636 700059 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:08.962694 700059 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc0004e9470 10 D0713 05:28:08.962723 700059 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:08.962871 700059 usertrap_amd64.go:212] [ 1075: 1078] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:08.962890 700059 usertrap_amd64.go:122] [ 1075: 1078] Allocate a new trap: 0xc0004e9470 11 D0713 05:28:08.962899 700059 usertrap_amd64.go:225] [ 1075: 1078] Apply the binary patch addr 46b6e0 trap addr 61370 ([184 24 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:08.969996 700059 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46af29:sysno 293 D0713 05:28:08.970040 700059 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc0004e9470 12 D0713 05:28:08.970055 700059 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:08.973245 700059 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46b020:sysno 39 D0713 05:28:08.973327 700059 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc0004e9470 13 D0713 05:28:08.973347 700059 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:08.973423 700059 usertrap_amd64.go:212] [ 1075: 1076] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:08.973433 700059 usertrap_amd64.go:122] [ 1075: 1076] Allocate a new trap: 0xc0004e9470 14 D0713 05:28:08.973442 700059 usertrap_amd64.go:225] [ 1075: 1076] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:08.973537 700059 task_signals.go:470] [ 1075: 1075] Notified of signal 23 D0713 05:28:08.973613 700059 task_signals.go:220] [ 1075: 1075] Signal 23: delivering to handler D0713 05:28:08.985160 700059 task_signals.go:470] [ 1075: 1075] Notified of signal 23 D0713 05:28:08.985380 700059 task_signals.go:220] [ 1075: 1075] Signal 23: delivering to handler D0713 05:28:08.986056 700059 usertrap_amd64.go:212] [ 1075: 1075] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:08.986102 700059 usertrap_amd64.go:122] [ 1075: 1075] Allocate a new trap: 0xc0004e9470 15 D0713 05:28:08.986123 700059 usertrap_amd64.go:225] [ 1075: 1075] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 05:28:08.986189 700059 task_exit.go:204] [ 1075: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.986227 700059 task_exit.go:204] [ 1075: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.986243 700059 task_signals.go:204] [ 1075: 1077] Signal 1075, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.986253 700059 task_signals.go:204] [ 1075: 1079] Signal 1075, PID: 1079, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.986279 700059 task_exit.go:204] [ 1075: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.986269 700059 task_signals.go:204] [ 1075: 1078] Signal 1075, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.986308 700059 task_signals.go:204] [ 1075: 1076] Signal 1075, PID: 1076, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:08.986340 700059 task_exit.go:204] [ 1075: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.986348 700059 task_exit.go:204] [ 1075: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.986367 700059 task_exit.go:204] [ 1075: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.986403 700059 task_exit.go:204] [ 1075: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.986469 700059 task_exit.go:204] [ 1075: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.986497 700059 task_exit.go:204] [ 1075: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.986534 700059 task_exit.go:204] [ 1075: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.986543 700059 task_exit.go:204] [ 1075: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.986564 700059 task_exit.go:204] [ 1075: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:08.988031 700059 task_exit.go:204] [ 1075: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:08.988053 700059 task_exit.go:204] [ 1075: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.988068 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:08.988096 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:08.988105 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:08.988496 700059 task_exit.go:204] [ 1075: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:08.989439 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.990974 700059 syscalls.go:262] [ 1080: 1080] Allocating stack with size of 8388608 bytes D0713 05:28:08.991100 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:08.992586 700059 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:08.992702 700059 usertrap_amd64.go:106] [ 1080: 1080] Map a usertrap vma at 67000 D0713 05:28:08.992856 700059 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0006ea0c0 1 D0713 05:28:08.992899 700059 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:08.994902 700059 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:08.994930 700059 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0006ea0c0 2 D0713 05:28:08.994954 700059 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:08.996184 700059 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:08.996243 700059 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0006ea0c0 3 D0713 05:28:08.996261 700059 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:09.003225 700059 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.003264 700059 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0006ea0c0 4 D0713 05:28:09.003285 700059 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:09.004659 700059 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.004701 700059 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0006ea0c0 5 D0713 05:28:09.004717 700059 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:09.004782 700059 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.004793 700059 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0006ea0c0 6 D0713 05:28:09.004800 700059 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:09.005368 700059 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.005390 700059 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0006ea0c0 7 D0713 05:28:09.005400 700059 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:09.005665 700059 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.005687 700059 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc0006ea0c0 8 D0713 05:28:09.005698 700059 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:09.005862 700059 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.005886 700059 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc0006ea0c0 9 D0713 05:28:09.005898 700059 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:09.006144 700059 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.006168 700059 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc0006ea0c0 10 D0713 05:28:09.006187 700059 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46b020 trap addr 67320 ([184 39 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:09.006291 700059 usertrap_amd64.go:212] [ 1080: 1081] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.006318 700059 usertrap_amd64.go:122] [ 1080: 1081] Allocate a new trap: 0xc0006ea0c0 11 D0713 05:28:09.006331 700059 usertrap_amd64.go:225] [ 1080: 1081] Apply the binary patch addr 46b04f trap addr 67370 ([184 234 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:09.006354 700059 task_signals.go:481] [ 1080: 1080] No task notified of signal 23 D0713 05:28:09.006569 700059 task_signals.go:220] [ 1080: 1080] Signal 23: delivering to handler D0713 05:28:09.006732 700059 usertrap_amd64.go:212] [ 1080: 1082] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.006907 700059 usertrap_amd64.go:122] [ 1080: 1082] Allocate a new trap: 0xc0006ea0c0 12 D0713 05:28:09.007097 700059 usertrap_amd64.go:225] [ 1080: 1082] Apply the binary patch addr 46b57c trap addr 673c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:09.015086 700059 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.015136 700059 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0006ea0c0 13 D0713 05:28:09.015157 700059 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:09.020246 700059 task_signals.go:470] [ 1080: 1080] Notified of signal 23 D0713 05:28:09.020341 700059 task_signals.go:220] [ 1080: 1080] Signal 23: delivering to handler D0713 05:28:09.027204 700059 usertrap_amd64.go:212] [ 1080: 1080] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.027265 700059 usertrap_amd64.go:122] [ 1080: 1080] Allocate a new trap: 0xc0006ea0c0 14 D0713 05:28:09.027287 700059 usertrap_amd64.go:225] [ 1080: 1080] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:09.027346 700059 task_exit.go:204] [ 1080: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.027378 700059 task_exit.go:204] [ 1080: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.027416 700059 task_signals.go:204] [ 1080: 1081] Signal 1080, PID: 1081, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.027448 700059 task_exit.go:204] [ 1080: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.027459 700059 task_exit.go:204] [ 1080: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.027466 700059 task_exit.go:204] [ 1080: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.027491 700059 task_signals.go:204] [ 1080: 1084] Signal 1080, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.027531 700059 task_exit.go:204] [ 1080: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.027605 700059 task_signals.go:204] [ 1080: 1085] Signal 1080, PID: 1085, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.027648 700059 task_signals.go:204] [ 1080: 1082] Signal 1080, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.027695 700059 task_signals.go:204] [ 1080: 1083] Signal 1080, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.027730 700059 task_exit.go:204] [ 1080: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.027751 700059 task_exit.go:204] [ 1080: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.027782 700059 task_exit.go:204] [ 1080: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.027827 700059 task_exit.go:204] [ 1080: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.027834 700059 task_exit.go:204] [ 1080: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.027854 700059 task_exit.go:204] [ 1080: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.027872 700059 task_exit.go:204] [ 1080: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.027877 700059 task_exit.go:204] [ 1080: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.027890 700059 task_exit.go:204] [ 1080: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.029215 700059 task_exit.go:204] [ 1080: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.029258 700059 task_exit.go:204] [ 1080: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.029279 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.029317 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.029328 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.029466 700059 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 05:28:09.029494 700059 task_exit.go:204] [ 1080: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.029513 700059 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 05:28:09.030308 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.031993 700059 syscalls.go:262] [ 1086: 1086] Allocating stack with size of 8388608 bytes D0713 05:28:09.032135 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.032858 700059 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.032892 700059 usertrap_amd64.go:106] [ 1086: 1086] Map a usertrap vma at 60000 D0713 05:28:09.032999 700059 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc001569740 1 D0713 05:28:09.033052 700059 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:09.034251 700059 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.034274 700059 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc001569740 2 D0713 05:28:09.034287 700059 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:09.034922 700059 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.034946 700059 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc001569740 3 D0713 05:28:09.034961 700059 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:09.041441 700059 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.041471 700059 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc001569740 4 D0713 05:28:09.041487 700059 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:09.042584 700059 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.042616 700059 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc001569740 5 D0713 05:28:09.042630 700059 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:09.042706 700059 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.042726 700059 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc001569740 6 D0713 05:28:09.042738 700059 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:09.043001 700059 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.043024 700059 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc001569740 7 D0713 05:28:09.043036 700059 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:09.043180 700059 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.043208 700059 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc001569740 8 D0713 05:28:09.043220 700059 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:09.043833 700059 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.043886 700059 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc001569740 9 D0713 05:28:09.043901 700059 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:09.043991 700059 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.044023 700059 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc001569740 10 D0713 05:28:09.044036 700059 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:09.053310 700059 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.053344 700059 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc001569740 11 D0713 05:28:09.053361 700059 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:09.054329 700059 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.054390 700059 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc001569740 12 D0713 05:28:09.054413 700059 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:09.054478 700059 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.054507 700059 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc001569740 13 D0713 05:28:09.054519 700059 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:09.054563 700059 task_signals.go:470] [ 1086: 1086] Notified of signal 23 D0713 05:28:09.054874 700059 task_signals.go:220] [ 1086: 1086] Signal 23: delivering to handler D0713 05:28:09.057811 700059 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0713 05:28:09.065650 700059 task_signals.go:470] [ 1086: 1086] Notified of signal 23 D0713 05:28:09.066100 700059 task_signals.go:220] [ 1086: 1086] Signal 23: delivering to handler I0713 05:28:09.068175 700059 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0713 05:28:09.068314 700059 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.068339 700059 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc001569740 14 D0713 05:28:09.068355 700059 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:09.068440 700059 task_exit.go:204] [ 1086: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.068487 700059 task_exit.go:204] [ 1086: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.068511 700059 task_signals.go:204] [ 1086: 1087] Signal 1086, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.068547 700059 task_signals.go:204] [ 1086: 1088] Signal 1086, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.068561 700059 task_exit.go:204] [ 1086: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.068590 700059 task_exit.go:204] [ 1086: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.068613 700059 task_exit.go:204] [ 1086: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.068566 700059 task_signals.go:204] [ 1086: 1091] Signal 1086, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.068526 700059 task_signals.go:204] [ 1086: 1089] Signal 1086, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.068655 700059 task_exit.go:204] [ 1086: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.068692 700059 task_signals.go:204] [ 1086: 1090] Signal 1086, PID: 1090, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.068738 700059 task_exit.go:204] [ 1086: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.068750 700059 task_exit.go:204] [ 1086: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.068773 700059 task_exit.go:204] [ 1086: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.068787 700059 task_exit.go:204] [ 1086: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.068795 700059 task_exit.go:204] [ 1086: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.068811 700059 task_exit.go:204] [ 1086: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.068822 700059 task_exit.go:204] [ 1086: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.068839 700059 task_exit.go:204] [ 1086: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.068851 700059 task_exit.go:204] [ 1086: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.070318 700059 task_exit.go:204] [ 1086: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.070348 700059 task_exit.go:204] [ 1086: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.070365 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.070419 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.070432 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.070538 700059 task_exit.go:204] [ 1086: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.071368 700059 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.072881 700059 syscalls.go:262] [ 1092: 1092] Allocating stack with size of 8388608 bytes D0713 05:28:09.073086 700059 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.074542 700059 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.074621 700059 usertrap_amd64.go:106] [ 1092: 1092] Map a usertrap vma at 6a000 D0713 05:28:09.074739 700059 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0006ea360 1 D0713 05:28:09.074775 700059 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:09.075355 700059 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.075374 700059 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0006ea360 2 D0713 05:28:09.075388 700059 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:09.077381 700059 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.077414 700059 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0006ea360 3 D0713 05:28:09.077426 700059 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:09.084509 700059 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.084559 700059 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0006ea360 4 D0713 05:28:09.084575 700059 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:09.085820 700059 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.085855 700059 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0006ea360 5 D0713 05:28:09.085868 700059 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:09.085946 700059 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.085973 700059 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0006ea360 6 D0713 05:28:09.085984 700059 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:09.086652 700059 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.086682 700059 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0006ea360 7 D0713 05:28:09.086691 700059 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:09.086862 700059 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.086880 700059 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc0006ea360 8 D0713 05:28:09.086887 700059 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:09.087142 700059 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.087220 700059 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc0006ea360 9 D0713 05:28:09.087251 700059 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:09.087277 700059 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.087286 700059 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0006ea360 10 D0713 05:28:09.087372 700059 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:09.087497 700059 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.087645 700059 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc0006ea360 11 D0713 05:28:09.087676 700059 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:09.087809 700059 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.087836 700059 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc0006ea360 12 D0713 05:28:09.087847 700059 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:09.087889 700059 task_signals.go:470] [ 1092: 1095] Notified of signal 23 D0713 05:28:09.087922 700059 task_signals.go:179] [ 1092: 1095] Restarting syscall 202: interrupted by signal 23 D0713 05:28:09.087932 700059 task_signals.go:220] [ 1092: 1095] Signal 23: delivering to handler D0713 05:28:09.096462 700059 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.096500 700059 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0006ea360 13 D0713 05:28:09.096511 700059 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:09.099547 700059 task_signals.go:470] [ 1092: 1092] Notified of signal 23 D0713 05:28:09.099615 700059 task_signals.go:220] [ 1092: 1092] Signal 23: delivering to handler I0713 05:28:09.108617 700059 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0713 05:28:09.108732 700059 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.108750 700059 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0006ea360 14 D0713 05:28:09.108762 700059 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:09.108853 700059 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.108987 700059 task_signals.go:204] [ 1092: 1096] Signal 1092, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.109044 700059 task_signals.go:204] [ 1092: 1094] Signal 1092, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.109066 700059 task_signals.go:204] [ 1092: 1095] Signal 1092, PID: 1095, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.109081 700059 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.109118 700059 task_signals.go:204] [ 1092: 1093] Signal 1092, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.109130 700059 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.109138 700059 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.109169 700059 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.109188 700059 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.109207 700059 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.109211 700059 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.109219 700059 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.109225 700059 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.109229 700059 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.109330 700059 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.110575 700059 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.110606 700059 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.110625 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.110874 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.111865 700059 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.112869 700059 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.114794 700059 syscalls.go:262] [ 1097: 1097] Allocating stack with size of 8388608 bytes D0713 05:28:09.114940 700059 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.116281 700059 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.116329 700059 usertrap_amd64.go:106] [ 1097: 1097] Map a usertrap vma at 65000 D0713 05:28:09.116480 700059 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0004e9740 1 D0713 05:28:09.116561 700059 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:09.117394 700059 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.117429 700059 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0004e9740 2 D0713 05:28:09.117445 700059 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:09.118564 700059 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.118593 700059 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0004e9740 3 D0713 05:28:09.118610 700059 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:09.127681 700059 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.127737 700059 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0004e9740 4 D0713 05:28:09.127752 700059 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:09.129068 700059 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.129108 700059 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0004e9740 5 D0713 05:28:09.129122 700059 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:09.129167 700059 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.129182 700059 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0004e9740 6 D0713 05:28:09.129191 700059 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:09.129704 700059 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.129732 700059 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0004e9740 7 D0713 05:28:09.129741 700059 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:09.129972 700059 usertrap_amd64.go:212] [ 1097: 1098] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.130017 700059 usertrap_amd64.go:122] [ 1097: 1098] Allocate a new trap: 0xc0004e9740 8 D0713 05:28:09.130047 700059 usertrap_amd64.go:225] [ 1097: 1098] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:09.130405 700059 usertrap_amd64.go:212] [ 1097: 1098] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.130616 700059 usertrap_amd64.go:122] [ 1097: 1098] Allocate a new trap: 0xc0004e9740 9 D0713 05:28:09.130648 700059 usertrap_amd64.go:225] [ 1097: 1098] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:09.130687 700059 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.131062 700059 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0004e9740 10 D0713 05:28:09.131092 700059 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:09.139915 700059 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.139982 700059 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0004e9740 11 D0713 05:28:09.140004 700059 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:09.142957 700059 usertrap_amd64.go:212] [ 1097: 1098] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.143034 700059 usertrap_amd64.go:122] [ 1097: 1098] Allocate a new trap: 0xc0004e9740 12 D0713 05:28:09.143056 700059 usertrap_amd64.go:225] [ 1097: 1098] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:09.143261 700059 usertrap_amd64.go:212] [ 1097: 1098] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.143294 700059 usertrap_amd64.go:122] [ 1097: 1098] Allocate a new trap: 0xc0004e9740 13 D0713 05:28:09.143307 700059 usertrap_amd64.go:225] [ 1097: 1098] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:09.143374 700059 task_signals.go:470] [ 1097: 1097] Notified of signal 23 D0713 05:28:09.143466 700059 task_signals.go:220] [ 1097: 1097] Signal 23: delivering to handler D0713 05:28:09.153848 700059 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.153906 700059 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0004e9740 14 D0713 05:28:09.153930 700059 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:09.153999 700059 task_exit.go:204] [ 1097: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.154020 700059 task_exit.go:204] [ 1097: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.154049 700059 task_signals.go:204] [ 1097: 1100] Signal 1097, PID: 1100, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.154064 700059 task_exit.go:204] [ 1097: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.154051 700059 task_signals.go:204] [ 1097: 1099] Signal 1097, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.154070 700059 task_exit.go:204] [ 1097: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.154107 700059 task_exit.go:204] [ 1097: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.154140 700059 task_signals.go:204] [ 1097: 1101] Signal 1097, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.154158 700059 task_exit.go:204] [ 1097: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.154164 700059 task_signals.go:204] [ 1097: 1098] Signal 1097, PID: 1098, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.154168 700059 task_exit.go:204] [ 1097: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.154274 700059 task_exit.go:204] [ 1097: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.154304 700059 task_exit.go:204] [ 1097: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.154331 700059 task_exit.go:204] [ 1097: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.154371 700059 task_exit.go:204] [ 1097: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.154388 700059 task_exit.go:204] [ 1097: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.155725 700059 task_exit.go:204] [ 1097: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.155766 700059 task_exit.go:204] [ 1097: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.155782 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.156649 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.157052 700059 task_exit.go:204] [ 1097: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.158962 700059 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.160416 700059 syscalls.go:262] [ 1102: 1102] Allocating stack with size of 8388608 bytes D0713 05:28:09.160551 700059 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.162990 700059 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.163029 700059 usertrap_amd64.go:106] [ 1102: 1102] Map a usertrap vma at 63000 D0713 05:28:09.163119 700059 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000d328a0 1 D0713 05:28:09.163149 700059 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:09.163680 700059 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.163732 700059 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000d328a0 2 D0713 05:28:09.163747 700059 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:09.164617 700059 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.164646 700059 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000d328a0 3 D0713 05:28:09.164669 700059 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:09.173092 700059 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.173156 700059 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000d328a0 4 D0713 05:28:09.173176 700059 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:09.174511 700059 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.174551 700059 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000d328a0 5 D0713 05:28:09.174567 700059 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:09.174652 700059 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.174677 700059 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000d328a0 6 D0713 05:28:09.174689 700059 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:09.175274 700059 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.175303 700059 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000d328a0 7 D0713 05:28:09.175314 700059 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:09.175546 700059 usertrap_amd64.go:212] [ 1102: 1103] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.175577 700059 usertrap_amd64.go:122] [ 1102: 1103] Allocate a new trap: 0xc000d328a0 8 D0713 05:28:09.175588 700059 usertrap_amd64.go:225] [ 1102: 1103] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:09.175809 700059 usertrap_amd64.go:212] [ 1102: 1103] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.175892 700059 usertrap_amd64.go:122] [ 1102: 1103] Allocate a new trap: 0xc000d328a0 9 D0713 05:28:09.175918 700059 usertrap_amd64.go:225] [ 1102: 1103] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:09.176129 700059 usertrap_amd64.go:212] [ 1102: 1104] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.176152 700059 usertrap_amd64.go:122] [ 1102: 1104] Allocate a new trap: 0xc000d328a0 10 D0713 05:28:09.176164 700059 usertrap_amd64.go:225] [ 1102: 1104] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:09.184686 700059 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.184727 700059 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000d328a0 11 D0713 05:28:09.184747 700059 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:09.187463 700059 usertrap_amd64.go:212] [ 1102: 1103] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.187499 700059 usertrap_amd64.go:122] [ 1102: 1103] Allocate a new trap: 0xc000d328a0 12 D0713 05:28:09.187513 700059 usertrap_amd64.go:225] [ 1102: 1103] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:09.187599 700059 usertrap_amd64.go:212] [ 1102: 1103] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.187611 700059 usertrap_amd64.go:122] [ 1102: 1103] Allocate a new trap: 0xc000d328a0 13 D0713 05:28:09.187620 700059 usertrap_amd64.go:225] [ 1102: 1103] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:09.187641 700059 task_signals.go:470] [ 1102: 1102] Notified of signal 23 D0713 05:28:09.187725 700059 task_signals.go:220] [ 1102: 1102] Signal 23: delivering to handler D0713 05:28:09.197964 700059 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.197998 700059 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000d328a0 14 D0713 05:28:09.198008 700059 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:09.198072 700059 task_exit.go:204] [ 1102: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.198085 700059 task_exit.go:204] [ 1102: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.198105 700059 task_signals.go:204] [ 1102: 1103] Signal 1102, PID: 1103, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.198115 700059 task_exit.go:204] [ 1102: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.198120 700059 task_exit.go:204] [ 1102: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.198123 700059 task_exit.go:204] [ 1102: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.198140 700059 task_signals.go:204] [ 1102: 1104] Signal 1102, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.198146 700059 task_exit.go:204] [ 1102: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.198151 700059 task_exit.go:204] [ 1102: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.198154 700059 task_exit.go:204] [ 1102: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.198167 700059 task_signals.go:204] [ 1102: 1105] Signal 1102, PID: 1105, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.198174 700059 task_exit.go:204] [ 1102: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.198178 700059 task_exit.go:204] [ 1102: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.198181 700059 task_exit.go:204] [ 1102: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.198198 700059 task_signals.go:204] [ 1102: 1106] Signal 1102, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.198204 700059 task_exit.go:204] [ 1102: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.199898 700059 task_exit.go:204] [ 1102: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.199946 700059 task_exit.go:204] [ 1102: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.199963 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.200013 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.200175 700059 task_exit.go:204] [ 1102: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.200297 700059 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 05:28:09.200326 700059 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 05:28:09.201630 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.203518 700059 syscalls.go:262] [ 1107: 1107] Allocating stack with size of 8388608 bytes D0713 05:28:09.203723 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.205068 700059 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.205115 700059 usertrap_amd64.go:106] [ 1107: 1107] Map a usertrap vma at 6a000 D0713 05:28:09.205200 700059 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc000319350 1 D0713 05:28:09.205227 700059 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:09.205667 700059 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.205688 700059 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc000319350 2 D0713 05:28:09.205697 700059 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:09.207154 700059 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.207200 700059 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc000319350 3 D0713 05:28:09.207215 700059 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:09.215306 700059 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.215378 700059 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc000319350 4 D0713 05:28:09.215395 700059 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:09.216823 700059 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.216848 700059 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc000319350 5 D0713 05:28:09.216867 700059 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:09.216981 700059 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.217005 700059 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc000319350 6 D0713 05:28:09.217016 700059 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:09.217531 700059 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.217567 700059 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc000319350 7 D0713 05:28:09.217579 700059 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:09.217839 700059 usertrap_amd64.go:212] [ 1107: 1108] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.217872 700059 usertrap_amd64.go:122] [ 1107: 1108] Allocate a new trap: 0xc000319350 8 D0713 05:28:09.217886 700059 usertrap_amd64.go:225] [ 1107: 1108] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:09.218172 700059 usertrap_amd64.go:212] [ 1107: 1108] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.218199 700059 usertrap_amd64.go:122] [ 1107: 1108] Allocate a new trap: 0xc000319350 9 D0713 05:28:09.218211 700059 usertrap_amd64.go:225] [ 1107: 1108] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:09.218283 700059 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.218295 700059 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc000319350 10 D0713 05:28:09.218306 700059 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:09.226840 700059 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.226877 700059 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc000319350 11 D0713 05:28:09.226892 700059 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:09.230413 700059 usertrap_amd64.go:212] [ 1107: 1108] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.230492 700059 usertrap_amd64.go:122] [ 1107: 1108] Allocate a new trap: 0xc000319350 12 D0713 05:28:09.230512 700059 usertrap_amd64.go:225] [ 1107: 1108] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:09.230583 700059 usertrap_amd64.go:212] [ 1107: 1108] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.230596 700059 usertrap_amd64.go:122] [ 1107: 1108] Allocate a new trap: 0xc000319350 13 D0713 05:28:09.230606 700059 usertrap_amd64.go:225] [ 1107: 1108] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:09.230687 700059 task_signals.go:470] [ 1107: 1107] Notified of signal 23 D0713 05:28:09.230792 700059 task_signals.go:220] [ 1107: 1107] Signal 23: delivering to handler D0713 05:28:09.239022 700059 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.239069 700059 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc000319350 14 D0713 05:28:09.239087 700059 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:09.239159 700059 task_exit.go:204] [ 1107: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.239208 700059 task_exit.go:204] [ 1107: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.239242 700059 task_signals.go:204] [ 1107: 1108] Signal 1107, PID: 1108, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.239281 700059 task_exit.go:204] [ 1107: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.239292 700059 task_exit.go:204] [ 1107: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.239300 700059 task_exit.go:204] [ 1107: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.239327 700059 task_signals.go:204] [ 1107: 1109] Signal 1107, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.239352 700059 task_exit.go:204] [ 1107: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.239362 700059 task_exit.go:204] [ 1107: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.239369 700059 task_exit.go:204] [ 1107: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.239389 700059 task_signals.go:204] [ 1107: 1110] Signal 1107, PID: 1110, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.239403 700059 task_exit.go:204] [ 1107: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.239412 700059 task_exit.go:204] [ 1107: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.239420 700059 task_exit.go:204] [ 1107: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.239453 700059 task_signals.go:204] [ 1107: 1111] Signal 1107, PID: 1111, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.239465 700059 task_exit.go:204] [ 1107: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.240922 700059 task_exit.go:204] [ 1107: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.241002 700059 task_exit.go:204] [ 1107: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.241024 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.241053 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.241064 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.241410 700059 task_exit.go:204] [ 1107: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.242112 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.243692 700059 syscalls.go:262] [ 1112: 1112] Allocating stack with size of 8388608 bytes D0713 05:28:09.243828 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.245288 700059 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.245324 700059 usertrap_amd64.go:106] [ 1112: 1112] Map a usertrap vma at 6a000 D0713 05:28:09.245425 700059 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000d32c60 1 D0713 05:28:09.245455 700059 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:09.245861 700059 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.245890 700059 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000d32c60 2 D0713 05:28:09.245902 700059 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:09.246736 700059 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.246763 700059 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000d32c60 3 D0713 05:28:09.246773 700059 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:09.255215 700059 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.255266 700059 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000d32c60 4 D0713 05:28:09.255287 700059 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:09.256519 700059 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.256563 700059 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000d32c60 5 D0713 05:28:09.256581 700059 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:09.256661 700059 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.256671 700059 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000d32c60 6 D0713 05:28:09.256681 700059 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:09.257248 700059 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.257284 700059 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000d32c60 7 D0713 05:28:09.257300 700059 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:09.257476 700059 usertrap_amd64.go:212] [ 1112: 1113] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.257509 700059 usertrap_amd64.go:122] [ 1112: 1113] Allocate a new trap: 0xc000d32c60 8 D0713 05:28:09.257526 700059 usertrap_amd64.go:225] [ 1112: 1113] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:09.257863 700059 usertrap_amd64.go:212] [ 1112: 1113] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.257904 700059 usertrap_amd64.go:122] [ 1112: 1113] Allocate a new trap: 0xc000d32c60 9 D0713 05:28:09.257918 700059 usertrap_amd64.go:225] [ 1112: 1113] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:09.257931 700059 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.257938 700059 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000d32c60 10 D0713 05:28:09.257948 700059 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:09.267269 700059 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.267322 700059 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000d32c60 11 D0713 05:28:09.267339 700059 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:09.269773 700059 usertrap_amd64.go:212] [ 1112: 1113] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.269825 700059 usertrap_amd64.go:122] [ 1112: 1113] Allocate a new trap: 0xc000d32c60 12 D0713 05:28:09.269844 700059 usertrap_amd64.go:225] [ 1112: 1113] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:09.269905 700059 usertrap_amd64.go:212] [ 1112: 1113] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.269962 700059 usertrap_amd64.go:122] [ 1112: 1113] Allocate a new trap: 0xc000d32c60 13 D0713 05:28:09.269989 700059 usertrap_amd64.go:225] [ 1112: 1113] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:09.270076 700059 task_signals.go:470] [ 1112: 1112] Notified of signal 23 D0713 05:28:09.270205 700059 task_signals.go:220] [ 1112: 1112] Signal 23: delivering to handler D0713 05:28:09.278345 700059 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.278392 700059 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000d32c60 14 D0713 05:28:09.278409 700059 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:09.278534 700059 task_exit.go:204] [ 1112: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.278576 700059 task_exit.go:204] [ 1112: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.278614 700059 task_signals.go:204] [ 1112: 1113] Signal 1112, PID: 1113, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.278634 700059 task_exit.go:204] [ 1112: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.278648 700059 task_exit.go:204] [ 1112: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.278663 700059 task_exit.go:204] [ 1112: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.278685 700059 task_signals.go:204] [ 1112: 1114] Signal 1112, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.278704 700059 task_exit.go:204] [ 1112: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.278711 700059 task_exit.go:204] [ 1112: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.278718 700059 task_exit.go:204] [ 1112: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.278737 700059 task_signals.go:204] [ 1112: 1115] Signal 1112, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.278754 700059 task_exit.go:204] [ 1112: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.278761 700059 task_exit.go:204] [ 1112: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.278783 700059 task_exit.go:204] [ 1112: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.278798 700059 task_signals.go:204] [ 1112: 1116] Signal 1112, PID: 1116, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.278807 700059 task_exit.go:204] [ 1112: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.280080 700059 task_exit.go:204] [ 1112: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.280118 700059 task_exit.go:204] [ 1112: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.280133 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.280205 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.280240 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.280401 700059 task_exit.go:204] [ 1112: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.281029 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.282444 700059 syscalls.go:262] [ 1117: 1117] Allocating stack with size of 8388608 bytes D0713 05:28:09.282578 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.285161 700059 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.285208 700059 usertrap_amd64.go:106] [ 1117: 1117] Map a usertrap vma at 64000 D0713 05:28:09.285264 700059 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc0006ea690 1 D0713 05:28:09.285286 700059 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:09.287664 700059 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.287698 700059 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc0006ea690 2 D0713 05:28:09.289886 700059 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:09.290585 700059 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.290658 700059 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc0006ea690 3 D0713 05:28:09.290678 700059 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:09.298832 700059 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.298906 700059 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc0006ea690 4 D0713 05:28:09.298926 700059 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:09.300533 700059 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.300577 700059 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc0006ea690 5 D0713 05:28:09.300592 700059 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:09.300684 700059 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.300706 700059 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc0006ea690 6 D0713 05:28:09.300716 700059 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:09.301375 700059 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.301415 700059 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc0006ea690 7 D0713 05:28:09.301429 700059 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:09.301701 700059 usertrap_amd64.go:212] [ 1117: 1118] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.301766 700059 usertrap_amd64.go:122] [ 1117: 1118] Allocate a new trap: 0xc0006ea690 8 D0713 05:28:09.301789 700059 usertrap_amd64.go:225] [ 1117: 1118] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:09.302152 700059 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.302218 700059 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc0006ea690 9 D0713 05:28:09.302383 700059 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:09.302471 700059 usertrap_amd64.go:212] [ 1117: 1118] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.302490 700059 usertrap_amd64.go:122] [ 1117: 1118] Allocate a new trap: 0xc0006ea690 10 D0713 05:28:09.302503 700059 usertrap_amd64.go:225] [ 1117: 1118] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:09.311781 700059 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.311839 700059 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc0006ea690 11 D0713 05:28:09.311858 700059 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:09.314543 700059 usertrap_amd64.go:212] [ 1117: 1118] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.314588 700059 usertrap_amd64.go:122] [ 1117: 1118] Allocate a new trap: 0xc0006ea690 12 D0713 05:28:09.314608 700059 usertrap_amd64.go:225] [ 1117: 1118] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:09.314673 700059 usertrap_amd64.go:212] [ 1117: 1118] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.314701 700059 usertrap_amd64.go:122] [ 1117: 1118] Allocate a new trap: 0xc0006ea690 13 D0713 05:28:09.314714 700059 usertrap_amd64.go:225] [ 1117: 1118] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:09.314772 700059 task_signals.go:470] [ 1117: 1117] Notified of signal 23 D0713 05:28:09.314932 700059 task_signals.go:220] [ 1117: 1117] Signal 23: delivering to handler D0713 05:28:09.324902 700059 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.325047 700059 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc0006ea690 14 D0713 05:28:09.325069 700059 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:09.325176 700059 task_exit.go:204] [ 1117: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.325207 700059 task_exit.go:204] [ 1117: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.325253 700059 task_signals.go:204] [ 1117: 1120] Signal 1117, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.325293 700059 task_exit.go:204] [ 1117: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.325304 700059 task_exit.go:204] [ 1117: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.325311 700059 task_exit.go:204] [ 1117: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.325254 700059 task_signals.go:204] [ 1117: 1119] Signal 1117, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.325408 700059 task_exit.go:204] [ 1117: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.325449 700059 task_signals.go:204] [ 1117: 1118] Signal 1117, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.325390 700059 task_signals.go:204] [ 1117: 1121] Signal 1117, PID: 1121, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.325417 700059 task_signals.go:204] [ 1117: 1122] Signal 1117, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.325491 700059 task_exit.go:204] [ 1117: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.325500 700059 task_exit.go:204] [ 1117: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.325529 700059 task_exit.go:204] [ 1117: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.325594 700059 task_exit.go:204] [ 1117: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.325601 700059 task_exit.go:204] [ 1117: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.325622 700059 task_exit.go:204] [ 1117: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.325684 700059 task_exit.go:204] [ 1117: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.325702 700059 task_exit.go:204] [ 1117: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.325715 700059 task_exit.go:204] [ 1117: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.327172 700059 task_exit.go:204] [ 1117: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.327217 700059 task_exit.go:204] [ 1117: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.327240 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.327332 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.327351 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.327448 700059 task_exit.go:204] [ 1117: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.328442 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.330622 700059 syscalls.go:262] [ 1123: 1123] Allocating stack with size of 8388608 bytes D0713 05:28:09.330830 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.332560 700059 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.332628 700059 usertrap_amd64.go:106] [ 1123: 1123] Map a usertrap vma at 61000 D0713 05:28:09.332777 700059 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000d32f30 1 D0713 05:28:09.332817 700059 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:09.333329 700059 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.333359 700059 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000d32f30 2 D0713 05:28:09.333371 700059 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:09.334230 700059 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.334265 700059 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000d32f30 3 D0713 05:28:09.334279 700059 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:09.340828 700059 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.340889 700059 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000d32f30 4 D0713 05:28:09.340913 700059 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:09.342305 700059 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.342352 700059 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000d32f30 5 D0713 05:28:09.342372 700059 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:09.342448 700059 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.342477 700059 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000d32f30 6 D0713 05:28:09.342489 700059 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:09.343213 700059 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.343256 700059 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000d32f30 7 D0713 05:28:09.343276 700059 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:09.343567 700059 usertrap_amd64.go:212] [ 1123: 1124] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.343591 700059 usertrap_amd64.go:122] [ 1123: 1124] Allocate a new trap: 0xc000d32f30 8 D0713 05:28:09.343606 700059 usertrap_amd64.go:225] [ 1123: 1124] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:09.343904 700059 usertrap_amd64.go:212] [ 1123: 1124] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.343935 700059 usertrap_amd64.go:122] [ 1123: 1124] Allocate a new trap: 0xc000d32f30 9 D0713 05:28:09.343948 700059 usertrap_amd64.go:225] [ 1123: 1124] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:09.343963 700059 usertrap_amd64.go:212] [ 1123: 1125] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:09.343969 700059 usertrap_amd64.go:122] [ 1123: 1125] Allocate a new trap: 0xc000d32f30 10 D0713 05:28:09.343975 700059 usertrap_amd64.go:225] [ 1123: 1125] Apply the binary patch addr 46b6e0 trap addr 61320 ([184 24 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:09.344000 700059 usertrap_amd64.go:212] [ 1123: 1125] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.344021 700059 usertrap_amd64.go:122] [ 1123: 1125] Allocate a new trap: 0xc000d32f30 11 D0713 05:28:09.344032 700059 usertrap_amd64.go:225] [ 1123: 1125] Apply the binary patch addr 46b57c trap addr 61370 ([184 202 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:09.354081 700059 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.354132 700059 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000d32f30 12 D0713 05:28:09.354151 700059 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:09.355077 700059 usertrap_amd64.go:212] [ 1123: 1124] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.355167 700059 usertrap_amd64.go:122] [ 1123: 1124] Allocate a new trap: 0xc000d32f30 13 D0713 05:28:09.356829 700059 usertrap_amd64.go:225] [ 1123: 1124] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:09.356983 700059 usertrap_amd64.go:212] [ 1123: 1124] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.357015 700059 usertrap_amd64.go:122] [ 1123: 1124] Allocate a new trap: 0xc000d32f30 14 D0713 05:28:09.357029 700059 usertrap_amd64.go:225] [ 1123: 1124] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:09.357108 700059 task_signals.go:470] [ 1123: 1123] Notified of signal 23 D0713 05:28:09.357164 700059 task_signals.go:220] [ 1123: 1123] Signal 23: delivering to handler D0713 05:28:09.367591 700059 task_signals.go:470] [ 1123: 1123] Notified of signal 23 D0713 05:28:09.368450 700059 task_signals.go:220] [ 1123: 1123] Signal 23: delivering to handler D0713 05:28:09.369165 700059 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.369230 700059 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000d32f30 15 D0713 05:28:09.369253 700059 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 05:28:09.369351 700059 task_exit.go:204] [ 1123: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.369391 700059 task_exit.go:204] [ 1123: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.369434 700059 task_signals.go:204] [ 1123: 1124] Signal 1123, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.369471 700059 task_exit.go:204] [ 1123: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.369483 700059 task_exit.go:204] [ 1123: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.369489 700059 task_exit.go:204] [ 1123: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.369516 700059 task_signals.go:204] [ 1123: 1125] Signal 1123, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.369529 700059 task_exit.go:204] [ 1123: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.369537 700059 task_exit.go:204] [ 1123: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.369542 700059 task_exit.go:204] [ 1123: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.369561 700059 task_signals.go:204] [ 1123: 1126] Signal 1123, PID: 1126, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.369573 700059 task_exit.go:204] [ 1123: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.369584 700059 task_exit.go:204] [ 1123: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.369592 700059 task_exit.go:204] [ 1123: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.369631 700059 task_signals.go:204] [ 1123: 1127] Signal 1123, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.369654 700059 task_exit.go:204] [ 1123: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.371074 700059 task_exit.go:204] [ 1123: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.371116 700059 task_exit.go:204] [ 1123: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.371137 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.371233 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.371299 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.371475 700059 task_exit.go:204] [ 1123: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.372555 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.374621 700059 syscalls.go:262] [ 1128: 1128] Allocating stack with size of 8388608 bytes D0713 05:28:09.374818 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.376253 700059 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.376297 700059 usertrap_amd64.go:106] [ 1128: 1128] Map a usertrap vma at 64000 D0713 05:28:09.376402 700059 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0006ea750 1 D0713 05:28:09.376469 700059 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:09.377114 700059 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.377186 700059 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0006ea750 2 D0713 05:28:09.377208 700059 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:09.378885 700059 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.378914 700059 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0006ea750 3 D0713 05:28:09.378931 700059 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:09.387604 700059 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.387656 700059 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0006ea750 4 D0713 05:28:09.387675 700059 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:09.389886 700059 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.389979 700059 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0006ea750 5 D0713 05:28:09.390041 700059 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:09.390134 700059 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.390153 700059 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0006ea750 6 D0713 05:28:09.390167 700059 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:09.390527 700059 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.390557 700059 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0006ea750 7 D0713 05:28:09.390573 700059 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:09.391005 700059 usertrap_amd64.go:212] [ 1128: 1129] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.391038 700059 usertrap_amd64.go:122] [ 1128: 1129] Allocate a new trap: 0xc0006ea750 8 D0713 05:28:09.391052 700059 usertrap_amd64.go:225] [ 1128: 1129] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:09.391293 700059 usertrap_amd64.go:212] [ 1128: 1129] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.391322 700059 usertrap_amd64.go:122] [ 1128: 1129] Allocate a new trap: 0xc0006ea750 9 D0713 05:28:09.391336 700059 usertrap_amd64.go:225] [ 1128: 1129] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:09.391485 700059 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.391551 700059 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0006ea750 10 D0713 05:28:09.391563 700059 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:09.403187 700059 usertrap_amd64.go:212] [ 1128: 1129] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.403271 700059 usertrap_amd64.go:122] [ 1128: 1129] Allocate a new trap: 0xc0006ea750 11 D0713 05:28:09.403297 700059 usertrap_amd64.go:225] [ 1128: 1129] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:09.403354 700059 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.403389 700059 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0006ea750 12 D0713 05:28:09.403404 700059 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:09.403531 700059 usertrap_amd64.go:212] [ 1128: 1129] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.403581 700059 usertrap_amd64.go:122] [ 1128: 1129] Allocate a new trap: 0xc0006ea750 13 D0713 05:28:09.403602 700059 usertrap_amd64.go:225] [ 1128: 1129] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:09.403728 700059 task_signals.go:470] [ 1128: 1128] Notified of signal 23 D0713 05:28:09.403810 700059 task_signals.go:220] [ 1128: 1128] Signal 23: delivering to handler D0713 05:28:09.415268 700059 task_signals.go:470] [ 1128: 1128] Notified of signal 23 D0713 05:28:09.425222 700059 task_signals.go:220] [ 1128: 1128] Signal 23: delivering to handler D0713 05:28:09.426083 700059 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.426251 700059 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0006ea750 14 D0713 05:28:09.426294 700059 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:09.426452 700059 task_exit.go:204] [ 1128: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.426488 700059 task_exit.go:204] [ 1128: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.426526 700059 task_signals.go:204] [ 1128: 1131] Signal 1128, PID: 1131, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.426545 700059 task_exit.go:204] [ 1128: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.426515 700059 task_signals.go:204] [ 1128: 1130] Signal 1128, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.426555 700059 task_exit.go:204] [ 1128: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.426590 700059 task_exit.go:204] [ 1128: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.426655 700059 task_signals.go:204] [ 1128: 1132] Signal 1128, PID: 1132, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.426670 700059 task_exit.go:204] [ 1128: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.426681 700059 task_signals.go:204] [ 1128: 1129] Signal 1128, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.426704 700059 task_exit.go:204] [ 1128: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.426709 700059 task_exit.go:204] [ 1128: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.426719 700059 task_exit.go:204] [ 1128: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.426727 700059 task_exit.go:204] [ 1128: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.426731 700059 task_exit.go:204] [ 1128: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.426748 700059 task_exit.go:204] [ 1128: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.428362 700059 task_exit.go:204] [ 1128: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.428408 700059 task_exit.go:204] [ 1128: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.428427 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.428473 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.428487 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.428613 700059 task_exit.go:204] [ 1128: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.428862 700059 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 05:28:09.429074 700059 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 05:28:09.430189 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.431898 700059 syscalls.go:262] [ 1133: 1133] Allocating stack with size of 8388608 bytes D0713 05:28:09.432071 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.434869 700059 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.434963 700059 usertrap_amd64.go:106] [ 1133: 1133] Map a usertrap vma at 69000 D0713 05:28:09.435088 700059 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0005abe00 1 D0713 05:28:09.435155 700059 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:28:09.435745 700059 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.435789 700059 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0005abe00 2 D0713 05:28:09.435808 700059 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:28:09.436729 700059 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.436771 700059 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0005abe00 3 D0713 05:28:09.436788 700059 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:28:09.444788 700059 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.444842 700059 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0005abe00 4 D0713 05:28:09.444857 700059 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:28:09.446056 700059 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.446097 700059 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0005abe00 5 D0713 05:28:09.446112 700059 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:28:09.446199 700059 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.446209 700059 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0005abe00 6 D0713 05:28:09.446220 700059 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:28:09.446706 700059 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.446733 700059 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0005abe00 7 D0713 05:28:09.446757 700059 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:28:09.446994 700059 usertrap_amd64.go:212] [ 1133: 1134] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.447037 700059 usertrap_amd64.go:122] [ 1133: 1134] Allocate a new trap: 0xc0005abe00 8 D0713 05:28:09.447055 700059 usertrap_amd64.go:225] [ 1133: 1134] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:28:09.447433 700059 usertrap_amd64.go:212] [ 1133: 1134] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.447478 700059 usertrap_amd64.go:122] [ 1133: 1134] Allocate a new trap: 0xc0005abe00 9 D0713 05:28:09.447494 700059 usertrap_amd64.go:225] [ 1133: 1134] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:28:09.447595 700059 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.447727 700059 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0005abe00 10 D0713 05:28:09.447781 700059 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:28:09.448321 700059 usertrap_amd64.go:212] [ 1133: 1134] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.448351 700059 usertrap_amd64.go:122] [ 1133: 1134] Allocate a new trap: 0xc0005abe00 11 D0713 05:28:09.448370 700059 usertrap_amd64.go:225] [ 1133: 1134] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:28:09.448419 700059 usertrap_amd64.go:212] [ 1133: 1134] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.448442 700059 usertrap_amd64.go:122] [ 1133: 1134] Allocate a new trap: 0xc0005abe00 12 D0713 05:28:09.448458 700059 usertrap_amd64.go:225] [ 1133: 1134] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:28:09.448500 700059 task_signals.go:470] [ 1133: 1133] Notified of signal 23 D0713 05:28:09.448685 700059 task_signals.go:220] [ 1133: 1133] Signal 23: delivering to handler D0713 05:28:09.455859 700059 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.455880 700059 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0005abe00 13 D0713 05:28:09.455892 700059 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:28:09.459547 700059 task_signals.go:470] [ 1133: 1133] Notified of signal 23 D0713 05:28:09.459645 700059 task_signals.go:220] [ 1133: 1133] Signal 23: delivering to handler D0713 05:28:09.466624 700059 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.466655 700059 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0005abe00 14 D0713 05:28:09.466667 700059 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:28:09.466730 700059 task_exit.go:204] [ 1133: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.466752 700059 task_exit.go:204] [ 1133: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.466773 700059 task_signals.go:204] [ 1133: 1136] Signal 1133, PID: 1136, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.466791 700059 task_exit.go:204] [ 1133: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.466799 700059 task_exit.go:204] [ 1133: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.466790 700059 task_signals.go:204] [ 1133: 1134] Signal 1133, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.466773 700059 task_signals.go:204] [ 1133: 1135] Signal 1133, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.466812 700059 task_exit.go:204] [ 1133: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.466837 700059 task_exit.go:204] [ 1133: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.466839 700059 task_signals.go:204] [ 1133: 1137] Signal 1133, PID: 1137, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.466850 700059 task_exit.go:204] [ 1133: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.466859 700059 task_exit.go:204] [ 1133: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.466870 700059 task_exit.go:204] [ 1133: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.466892 700059 task_exit.go:204] [ 1133: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.466898 700059 task_exit.go:204] [ 1133: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.466911 700059 task_exit.go:204] [ 1133: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.467983 700059 task_exit.go:204] [ 1133: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.468012 700059 task_exit.go:204] [ 1133: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.468025 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.468049 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.468058 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.468167 700059 task_exit.go:204] [ 1133: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.469011 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.470647 700059 syscalls.go:262] [ 1138: 1138] Allocating stack with size of 8388608 bytes D0713 05:28:09.470932 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.473322 700059 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.473365 700059 usertrap_amd64.go:106] [ 1138: 1138] Map a usertrap vma at 67000 D0713 05:28:09.473438 700059 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc0005abef0 1 D0713 05:28:09.473478 700059 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:09.473671 700059 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.473715 700059 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc0005abef0 2 D0713 05:28:09.473726 700059 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:09.474603 700059 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.474710 700059 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc0005abef0 3 D0713 05:28:09.474724 700059 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:09.480064 700059 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.480102 700059 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc0005abef0 4 D0713 05:28:09.480123 700059 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:09.481311 700059 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.481340 700059 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc0005abef0 5 D0713 05:28:09.481352 700059 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:09.481402 700059 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.481416 700059 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc0005abef0 6 D0713 05:28:09.481421 700059 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:09.481590 700059 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.481607 700059 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc0005abef0 7 D0713 05:28:09.481617 700059 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:09.481718 700059 usertrap_amd64.go:212] [ 1138: 1139] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.481741 700059 usertrap_amd64.go:122] [ 1138: 1139] Allocate a new trap: 0xc0005abef0 8 D0713 05:28:09.481748 700059 usertrap_amd64.go:225] [ 1138: 1139] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:09.482073 700059 usertrap_amd64.go:212] [ 1138: 1139] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.482115 700059 usertrap_amd64.go:122] [ 1138: 1139] Allocate a new trap: 0xc0005abef0 9 D0713 05:28:09.482131 700059 usertrap_amd64.go:225] [ 1138: 1139] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:09.482195 700059 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.482389 700059 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc0005abef0 10 D0713 05:28:09.482419 700059 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:09.482519 700059 usertrap_amd64.go:212] [ 1138: 1141] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:09.482551 700059 usertrap_amd64.go:122] [ 1138: 1141] Allocate a new trap: 0xc0005abef0 11 D0713 05:28:09.482564 700059 usertrap_amd64.go:225] [ 1138: 1141] Apply the binary patch addr 46b6e0 trap addr 67370 ([184 24 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:09.490705 700059 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.490733 700059 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc0005abef0 12 D0713 05:28:09.490745 700059 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:09.493908 700059 usertrap_amd64.go:212] [ 1138: 1139] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.493933 700059 usertrap_amd64.go:122] [ 1138: 1139] Allocate a new trap: 0xc0005abef0 13 D0713 05:28:09.493943 700059 usertrap_amd64.go:225] [ 1138: 1139] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:09.493960 700059 usertrap_amd64.go:212] [ 1138: 1139] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.493965 700059 usertrap_amd64.go:122] [ 1138: 1139] Allocate a new trap: 0xc0005abef0 14 D0713 05:28:09.493970 700059 usertrap_amd64.go:225] [ 1138: 1139] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:09.493984 700059 task_signals.go:470] [ 1138: 1138] Notified of signal 23 D0713 05:28:09.494023 700059 task_signals.go:220] [ 1138: 1138] Signal 23: delivering to handler I0713 05:28:09.499969 700059 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0713 05:28:09.500047 700059 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.500056 700059 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc0005abef0 15 D0713 05:28:09.500067 700059 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 05:28:09.500100 700059 task_exit.go:204] [ 1138: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.500127 700059 task_exit.go:204] [ 1138: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.500147 700059 task_signals.go:204] [ 1138: 1142] Signal 1138, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.500172 700059 task_exit.go:204] [ 1138: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.500172 700059 task_signals.go:204] [ 1138: 1141] Signal 1138, PID: 1141, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.500218 700059 task_exit.go:204] [ 1138: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.500226 700059 task_exit.go:204] [ 1138: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.500243 700059 task_signals.go:204] [ 1138: 1139] Signal 1138, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.500257 700059 task_exit.go:204] [ 1138: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.500272 700059 task_signals.go:204] [ 1138: 1140] Signal 1138, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.500286 700059 task_signals.go:204] [ 1138: 1143] Signal 1138, PID: 1143, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.500302 700059 task_exit.go:204] [ 1138: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.500315 700059 task_exit.go:204] [ 1138: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.500325 700059 task_exit.go:204] [ 1138: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.500335 700059 task_exit.go:204] [ 1138: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.500348 700059 task_exit.go:204] [ 1138: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.500356 700059 task_exit.go:204] [ 1138: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.500360 700059 task_exit.go:204] [ 1138: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.500363 700059 task_exit.go:204] [ 1138: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.500370 700059 task_exit.go:204] [ 1138: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.501420 700059 task_exit.go:204] [ 1138: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.501468 700059 task_exit.go:204] [ 1138: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.501510 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.501551 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.501748 700059 task_exit.go:204] [ 1138: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.502544 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.504096 700059 syscalls.go:262] [ 1144: 1144] Allocating stack with size of 8388608 bytes D0713 05:28:09.504396 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.509692 700059 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.509737 700059 usertrap_amd64.go:106] [ 1144: 1144] Map a usertrap vma at 64000 D0713 05:28:09.509863 700059 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0028e8060 1 D0713 05:28:09.509892 700059 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:09.510296 700059 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.510308 700059 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0028e8060 2 D0713 05:28:09.510317 700059 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:09.510889 700059 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.510898 700059 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0028e8060 3 D0713 05:28:09.510905 700059 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:09.516539 700059 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.516579 700059 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0028e8060 4 D0713 05:28:09.516596 700059 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:09.517796 700059 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.517829 700059 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0028e8060 5 D0713 05:28:09.517859 700059 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:09.517914 700059 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.517935 700059 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0028e8060 6 D0713 05:28:09.517949 700059 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:09.518196 700059 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.518218 700059 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0028e8060 7 D0713 05:28:09.518227 700059 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:09.518367 700059 usertrap_amd64.go:212] [ 1144: 1145] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.518397 700059 usertrap_amd64.go:122] [ 1144: 1145] Allocate a new trap: 0xc0028e8060 8 D0713 05:28:09.518406 700059 usertrap_amd64.go:225] [ 1144: 1145] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:09.518593 700059 usertrap_amd64.go:212] [ 1144: 1145] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.518621 700059 usertrap_amd64.go:122] [ 1144: 1145] Allocate a new trap: 0xc0028e8060 9 D0713 05:28:09.518631 700059 usertrap_amd64.go:225] [ 1144: 1145] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:09.518720 700059 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.518741 700059 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0028e8060 10 D0713 05:28:09.518751 700059 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:09.524375 700059 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.524485 700059 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0028e8060 11 D0713 05:28:09.524498 700059 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:09.534324 700059 usertrap_amd64.go:212] [ 1144: 1145] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.534395 700059 usertrap_amd64.go:122] [ 1144: 1145] Allocate a new trap: 0xc0028e8060 12 D0713 05:28:09.535822 700059 usertrap_amd64.go:225] [ 1144: 1145] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:09.535955 700059 usertrap_amd64.go:212] [ 1144: 1145] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.535985 700059 usertrap_amd64.go:122] [ 1144: 1145] Allocate a new trap: 0xc0028e8060 13 D0713 05:28:09.536009 700059 usertrap_amd64.go:225] [ 1144: 1145] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:09.536343 700059 task_signals.go:470] [ 1144: 1144] Notified of signal 23 D0713 05:28:09.536459 700059 task_signals.go:220] [ 1144: 1144] Signal 23: delivering to handler D0713 05:28:09.545472 700059 usertrap_amd64.go:212] [ 1144: 1144] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.545566 700059 usertrap_amd64.go:122] [ 1144: 1144] Allocate a new trap: 0xc0028e8060 14 D0713 05:28:09.545589 700059 usertrap_amd64.go:225] [ 1144: 1144] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:09.545670 700059 task_exit.go:204] [ 1144: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.545702 700059 task_exit.go:204] [ 1144: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.545746 700059 task_signals.go:204] [ 1144: 1148] Signal 1144, PID: 1148, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.545780 700059 task_exit.go:204] [ 1144: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.545782 700059 task_signals.go:204] [ 1144: 1145] Signal 1144, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.545785 700059 task_signals.go:204] [ 1144: 1146] Signal 1144, PID: 1146, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.545747 700059 task_signals.go:204] [ 1144: 1147] Signal 1144, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.545793 700059 task_exit.go:204] [ 1144: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.545843 700059 task_exit.go:204] [ 1144: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.545874 700059 task_exit.go:204] [ 1144: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.545911 700059 task_exit.go:204] [ 1144: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.545917 700059 task_exit.go:204] [ 1144: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.545933 700059 task_exit.go:204] [ 1144: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.545957 700059 task_exit.go:204] [ 1144: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.545965 700059 task_exit.go:204] [ 1144: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.545979 700059 task_exit.go:204] [ 1144: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.547233 700059 task_exit.go:204] [ 1144: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.547262 700059 task_exit.go:204] [ 1144: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.547282 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.547369 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.547433 700059 task_exit.go:204] [ 1144: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.548335 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.550006 700059 syscalls.go:262] [ 1149: 1149] Allocating stack with size of 8388608 bytes D0713 05:28:09.550188 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.551196 700059 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.551246 700059 usertrap_amd64.go:106] [ 1149: 1149] Map a usertrap vma at 62000 D0713 05:28:09.551337 700059 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0006ea180 1 D0713 05:28:09.551373 700059 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:28:09.552339 700059 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.552371 700059 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0006ea180 2 D0713 05:28:09.552383 700059 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:28:09.553402 700059 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.553764 700059 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0006ea180 3 D0713 05:28:09.553802 700059 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:28:09.564227 700059 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.564334 700059 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0006ea180 4 D0713 05:28:09.564364 700059 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:28:09.565657 700059 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.565691 700059 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0006ea180 5 D0713 05:28:09.565708 700059 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:28:09.565827 700059 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.565844 700059 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0006ea180 6 D0713 05:28:09.565853 700059 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:28:09.566139 700059 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.566159 700059 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0006ea180 7 D0713 05:28:09.566167 700059 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:28:09.566335 700059 usertrap_amd64.go:212] [ 1149: 1150] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.566366 700059 usertrap_amd64.go:122] [ 1149: 1150] Allocate a new trap: 0xc0006ea180 8 D0713 05:28:09.566380 700059 usertrap_amd64.go:225] [ 1149: 1150] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:28:09.566631 700059 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.566661 700059 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0006ea180 9 D0713 05:28:09.566674 700059 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:28:09.566687 700059 usertrap_amd64.go:212] [ 1149: 1150] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.566695 700059 usertrap_amd64.go:122] [ 1149: 1150] Allocate a new trap: 0xc0006ea180 10 D0713 05:28:09.566766 700059 usertrap_amd64.go:225] [ 1149: 1150] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:28:09.577209 700059 usertrap_amd64.go:212] [ 1149: 1150] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.577232 700059 usertrap_amd64.go:122] [ 1149: 1150] Allocate a new trap: 0xc0006ea180 11 D0713 05:28:09.577247 700059 usertrap_amd64.go:225] [ 1149: 1150] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:28:09.577274 700059 usertrap_amd64.go:212] [ 1149: 1150] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.577292 700059 usertrap_amd64.go:122] [ 1149: 1150] Allocate a new trap: 0xc0006ea180 12 D0713 05:28:09.577306 700059 usertrap_amd64.go:225] [ 1149: 1150] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:28:09.577342 700059 task_signals.go:470] [ 1149: 1149] Notified of signal 23 D0713 05:28:09.577440 700059 task_signals.go:220] [ 1149: 1149] Signal 23: delivering to handler D0713 05:28:09.579247 700059 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.579270 700059 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0006ea180 13 D0713 05:28:09.579282 700059 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:28:09.588610 700059 task_signals.go:470] [ 1149: 1149] Notified of signal 23 D0713 05:28:09.589083 700059 task_signals.go:220] [ 1149: 1149] Signal 23: delivering to handler D0713 05:28:09.589326 700059 task_signals.go:470] [ 1149: 1149] Notified of signal 23 D0713 05:28:09.589360 700059 task_signals.go:220] [ 1149: 1149] Signal 23: delivering to handler D0713 05:28:09.589597 700059 usertrap_amd64.go:212] [ 1149: 1149] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.589619 700059 usertrap_amd64.go:122] [ 1149: 1149] Allocate a new trap: 0xc0006ea180 14 D0713 05:28:09.589629 700059 usertrap_amd64.go:225] [ 1149: 1149] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:28:09.589672 700059 task_exit.go:204] [ 1149: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.589700 700059 task_exit.go:204] [ 1149: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.589725 700059 task_signals.go:204] [ 1149: 1150] Signal 1149, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.589756 700059 task_signals.go:204] [ 1149: 1151] Signal 1149, PID: 1151, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.589766 700059 task_exit.go:204] [ 1149: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.589746 700059 task_signals.go:204] [ 1149: 1152] Signal 1149, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.589780 700059 task_exit.go:204] [ 1149: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.589786 700059 task_exit.go:204] [ 1149: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.589800 700059 task_exit.go:204] [ 1149: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.589806 700059 task_exit.go:204] [ 1149: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.589811 700059 task_exit.go:204] [ 1149: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.589820 700059 task_exit.go:204] [ 1149: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.589834 700059 task_exit.go:204] [ 1149: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.589838 700059 task_exit.go:204] [ 1149: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.589849 700059 task_signals.go:204] [ 1149: 1153] Signal 1149, PID: 1153, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.589866 700059 task_exit.go:204] [ 1149: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.590861 700059 task_exit.go:204] [ 1149: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.590884 700059 task_exit.go:204] [ 1149: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.590895 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.590920 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.590927 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.591030 700059 task_exit.go:204] [ 1149: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.592243 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.593747 700059 syscalls.go:262] [ 1154: 1154] Allocating stack with size of 8388608 bytes D0713 05:28:09.593932 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.594851 700059 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.594890 700059 usertrap_amd64.go:106] [ 1154: 1154] Map a usertrap vma at 64000 D0713 05:28:09.594985 700059 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc0028e8360 1 D0713 05:28:09.595013 700059 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:28:09.595347 700059 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.595364 700059 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc0028e8360 2 D0713 05:28:09.595375 700059 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:28:09.596087 700059 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.596131 700059 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc0028e8360 3 D0713 05:28:09.596145 700059 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:28:09.602441 700059 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.602486 700059 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc0028e8360 4 D0713 05:28:09.602497 700059 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:28:09.605280 700059 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.605436 700059 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc0028e8360 5 D0713 05:28:09.605464 700059 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:28:09.605511 700059 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.605569 700059 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc0028e8360 6 D0713 05:28:09.605579 700059 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:28:09.605842 700059 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.605867 700059 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc0028e8360 7 D0713 05:28:09.605876 700059 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:28:09.606113 700059 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.606137 700059 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc0028e8360 8 D0713 05:28:09.606149 700059 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:28:09.606344 700059 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.606365 700059 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc0028e8360 9 D0713 05:28:09.606374 700059 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:28:09.606455 700059 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.606464 700059 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc0028e8360 10 D0713 05:28:09.606473 700059 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:28:09.607191 700059 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.607226 700059 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc0028e8360 11 D0713 05:28:09.607273 700059 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:28:09.607385 700059 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.607409 700059 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc0028e8360 12 D0713 05:28:09.607418 700059 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:28:09.607498 700059 task_signals.go:470] [ 1154: 1154] Notified of signal 23 D0713 05:28:09.607523 700059 task_signals.go:220] [ 1154: 1154] Signal 23: delivering to handler D0713 05:28:09.614277 700059 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.614314 700059 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc0028e8360 13 D0713 05:28:09.614329 700059 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:28:09.618216 700059 task_signals.go:470] [ 1154: 1154] Notified of signal 23 D0713 05:28:09.618266 700059 task_signals.go:220] [ 1154: 1154] Signal 23: delivering to handler D0713 05:28:09.624722 700059 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.624766 700059 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc0028e8360 14 D0713 05:28:09.624784 700059 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:28:09.624866 700059 task_exit.go:204] [ 1154: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.624935 700059 task_signals.go:204] [ 1154: 1158] Signal 1154, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.625034 700059 task_signals.go:204] [ 1154: 1157] Signal 1154, PID: 1157, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.625043 700059 task_signals.go:204] [ 1154: 1156] Signal 1154, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.625049 700059 task_exit.go:204] [ 1154: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.625085 700059 task_signals.go:204] [ 1154: 1155] Signal 1154, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.625112 700059 task_exit.go:204] [ 1154: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.625123 700059 task_exit.go:204] [ 1154: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.625154 700059 task_exit.go:204] [ 1154: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.625167 700059 task_exit.go:204] [ 1154: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.625180 700059 task_exit.go:204] [ 1154: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.625194 700059 task_exit.go:204] [ 1154: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.625198 700059 task_exit.go:204] [ 1154: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.625205 700059 task_exit.go:204] [ 1154: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.625213 700059 task_exit.go:204] [ 1154: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.625217 700059 task_exit.go:204] [ 1154: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.626265 700059 task_exit.go:204] [ 1154: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.626304 700059 task_exit.go:204] [ 1154: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.626322 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.626374 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.626407 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.626537 700059 task_exit.go:204] [ 1154: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.627470 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.628929 700059 syscalls.go:262] [ 1159: 1159] Allocating stack with size of 8388608 bytes D0713 05:28:09.629279 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.630142 700059 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.630182 700059 usertrap_amd64.go:106] [ 1159: 1159] Map a usertrap vma at 63000 D0713 05:28:09.630265 700059 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004e82a0 1 D0713 05:28:09.630307 700059 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:09.630637 700059 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.630673 700059 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004e82a0 2 D0713 05:28:09.630686 700059 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:09.631282 700059 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.631310 700059 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004e82a0 3 D0713 05:28:09.631322 700059 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:09.638213 700059 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.638245 700059 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004e82a0 4 D0713 05:28:09.638255 700059 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:09.639627 700059 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.639645 700059 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004e82a0 5 D0713 05:28:09.639656 700059 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:09.639719 700059 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.639735 700059 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004e82a0 6 D0713 05:28:09.639768 700059 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:09.640018 700059 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.640042 700059 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004e82a0 7 D0713 05:28:09.640052 700059 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:09.640206 700059 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.640235 700059 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0004e82a0 8 D0713 05:28:09.640246 700059 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:09.640421 700059 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.640450 700059 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004e82a0 9 D0713 05:28:09.640462 700059 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:09.640501 700059 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.640509 700059 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0004e82a0 10 D0713 05:28:09.640518 700059 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:09.640665 700059 usertrap_amd64.go:212] [ 1159: 1162] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:09.640690 700059 usertrap_amd64.go:122] [ 1159: 1162] Allocate a new trap: 0xc0004e82a0 11 D0713 05:28:09.640703 700059 usertrap_amd64.go:225] [ 1159: 1162] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:09.648033 700059 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.648062 700059 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004e82a0 12 D0713 05:28:09.648071 700059 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:09.651710 700059 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.651734 700059 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0004e82a0 13 D0713 05:28:09.651754 700059 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:09.651798 700059 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.651807 700059 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc0004e82a0 14 D0713 05:28:09.651818 700059 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:09.651859 700059 task_signals.go:470] [ 1159: 1159] Notified of signal 23 D0713 05:28:09.651994 700059 task_signals.go:220] [ 1159: 1159] Signal 23: delivering to handler D0713 05:28:09.657954 700059 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.657992 700059 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc0004e82a0 15 D0713 05:28:09.658004 700059 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 05:28:09.658072 700059 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.658107 700059 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.658132 700059 task_signals.go:204] [ 1159: 1161] Signal 1159, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.658144 700059 task_signals.go:204] [ 1159: 1163] Signal 1159, PID: 1163, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.658167 700059 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.658134 700059 task_signals.go:204] [ 1159: 1162] Signal 1159, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.658178 700059 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.658184 700059 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.658125 700059 task_signals.go:204] [ 1159: 1160] Signal 1159, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.658202 700059 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.658208 700059 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.658215 700059 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.658223 700059 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.658234 700059 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.658237 700059 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.658243 700059 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.659358 700059 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.659393 700059 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.659411 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.659466 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.659622 700059 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.660330 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.661724 700059 syscalls.go:262] [ 1164: 1164] Allocating stack with size of 8388608 bytes D0713 05:28:09.661897 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.663312 700059 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.663445 700059 usertrap_amd64.go:106] [ 1164: 1164] Map a usertrap vma at 66000 D0713 05:28:09.663580 700059 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc001804600 1 D0713 05:28:09.663639 700059 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:28:09.663958 700059 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.663975 700059 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc001804600 2 D0713 05:28:09.663986 700059 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:28:09.664513 700059 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.664534 700059 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc001804600 3 D0713 05:28:09.664544 700059 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:28:09.670778 700059 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.670811 700059 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc001804600 4 D0713 05:28:09.670823 700059 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:28:09.672119 700059 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.672144 700059 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc001804600 5 D0713 05:28:09.672159 700059 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:28:09.672193 700059 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.672198 700059 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc001804600 6 D0713 05:28:09.672204 700059 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:28:09.672398 700059 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.672413 700059 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc001804600 7 D0713 05:28:09.672418 700059 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:28:09.672544 700059 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.672568 700059 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc001804600 8 D0713 05:28:09.672580 700059 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:28:09.672850 700059 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.672874 700059 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc001804600 9 D0713 05:28:09.672884 700059 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:28:09.672917 700059 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.672969 700059 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc001804600 10 D0713 05:28:09.672981 700059 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:28:09.673082 700059 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:09.673115 700059 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc001804600 11 D0713 05:28:09.673127 700059 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:28:09.673482 700059 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.673509 700059 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc001804600 12 D0713 05:28:09.673521 700059 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:28:09.673686 700059 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.673749 700059 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc001804600 13 D0713 05:28:09.673776 700059 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:28:09.673796 700059 task_signals.go:470] [ 1164: 1164] Notified of signal 23 D0713 05:28:09.673872 700059 task_signals.go:220] [ 1164: 1164] Signal 23: delivering to handler D0713 05:28:09.680393 700059 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.680422 700059 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc001804600 14 D0713 05:28:09.680433 700059 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46af29 trap addr 66460 ([184 37 1 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:28:09.684137 700059 task_signals.go:470] [ 1164: 1164] Notified of signal 23 D0713 05:28:09.684190 700059 task_signals.go:220] [ 1164: 1164] Signal 23: delivering to handler D0713 05:28:09.690373 700059 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.690412 700059 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc001804600 15 D0713 05:28:09.690428 700059 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 05:28:09.690935 700059 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.690979 700059 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.690978 700059 task_signals.go:204] [ 1164: 1165] Signal 1164, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.691013 700059 task_signals.go:204] [ 1164: 1168] Signal 1164, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.691029 700059 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.691012 700059 task_signals.go:204] [ 1164: 1166] Signal 1164, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.691130 700059 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.691164 700059 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.691232 700059 task_signals.go:204] [ 1164: 1167] Signal 1164, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.691246 700059 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.691254 700059 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.691258 700059 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.691266 700059 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.691271 700059 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.691274 700059 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.691281 700059 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.692339 700059 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.692363 700059 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.692376 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.692413 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.692426 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.692636 700059 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.693536 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.694957 700059 syscalls.go:262] [ 1169: 1169] Allocating stack with size of 8388608 bytes D0713 05:28:09.695117 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.695862 700059 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.695907 700059 usertrap_amd64.go:106] [ 1169: 1169] Map a usertrap vma at 61000 D0713 05:28:09.695988 700059 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc001804750 1 D0713 05:28:09.696011 700059 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:28:09.696214 700059 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.696244 700059 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc001804750 2 D0713 05:28:09.696256 700059 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:28:09.697230 700059 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.697256 700059 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc001804750 3 D0713 05:28:09.697268 700059 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:28:09.702226 700059 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.702252 700059 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc001804750 4 D0713 05:28:09.702262 700059 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:28:09.703328 700059 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.703359 700059 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc001804750 5 D0713 05:28:09.703372 700059 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:28:09.703424 700059 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.703437 700059 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc001804750 6 D0713 05:28:09.703443 700059 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:28:09.703652 700059 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.703670 700059 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc001804750 7 D0713 05:28:09.703677 700059 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:28:09.703810 700059 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.703833 700059 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc001804750 8 D0713 05:28:09.703844 700059 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:28:09.703970 700059 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.703993 700059 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc001804750 9 D0713 05:28:09.704004 700059 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:28:09.704123 700059 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:09.704145 700059 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc001804750 10 D0713 05:28:09.704153 700059 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b6e0 trap addr 61320 ([184 24 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:28:09.704233 700059 usertrap_amd64.go:212] [ 1169: 1171] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.704253 700059 usertrap_amd64.go:122] [ 1169: 1171] Allocate a new trap: 0xc001804750 11 D0713 05:28:09.704260 700059 usertrap_amd64.go:225] [ 1169: 1171] Apply the binary patch addr 46b57c trap addr 61370 ([184 202 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:28:09.711890 700059 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.711937 700059 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc001804750 12 D0713 05:28:09.711967 700059 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:28:09.714925 700059 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.714962 700059 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc001804750 13 D0713 05:28:09.714977 700059 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:28:09.715015 700059 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.715023 700059 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc001804750 14 D0713 05:28:09.715032 700059 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:28:09.715049 700059 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0713 05:28:09.715151 700059 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0713 05:28:09.725460 700059 sys_signal.go:495] [ 1169: 1169] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0713 05:28:09.725584 700059 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.725607 700059 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc001804750 15 D0713 05:28:09.725622 700059 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 05:28:09.725702 700059 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.725725 700059 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.725745 700059 task_signals.go:204] [ 1169: 1172] Signal 1169, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.725766 700059 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.725777 700059 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.725781 700059 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.725762 700059 task_signals.go:204] [ 1169: 1170] Signal 1169, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.725745 700059 task_signals.go:204] [ 1169: 1171] Signal 1169, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.725790 700059 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.725803 700059 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.725813 700059 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.725821 700059 task_signals.go:204] [ 1169: 1173] Signal 1169, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.725834 700059 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.725840 700059 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.725844 700059 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.725850 700059 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.726763 700059 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.726781 700059 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.726796 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.726832 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.726953 700059 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.727480 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.728912 700059 syscalls.go:262] [ 1174: 1174] Allocating stack with size of 8388608 bytes D0713 05:28:09.729082 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.730452 700059 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.730487 700059 usertrap_amd64.go:106] [ 1174: 1174] Map a usertrap vma at 6a000 D0713 05:28:09.730608 700059 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc000d32510 1 D0713 05:28:09.730646 700059 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:09.730912 700059 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.730930 700059 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc000d32510 2 D0713 05:28:09.730937 700059 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:09.732422 700059 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.732481 700059 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc000d32510 3 D0713 05:28:09.732504 700059 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:09.740544 700059 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.740591 700059 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc000d32510 4 D0713 05:28:09.740608 700059 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:09.742055 700059 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.742107 700059 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc000d32510 5 D0713 05:28:09.742122 700059 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:09.742188 700059 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.742197 700059 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc000d32510 6 D0713 05:28:09.742214 700059 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:09.742440 700059 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.742462 700059 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc000d32510 7 D0713 05:28:09.742470 700059 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:09.742655 700059 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.742673 700059 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc000d32510 8 D0713 05:28:09.742703 700059 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:09.742821 700059 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.742840 700059 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc000d32510 9 D0713 05:28:09.742846 700059 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:09.743046 700059 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.743122 700059 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc000d32510 10 D0713 05:28:09.743143 700059 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:09.743265 700059 usertrap_amd64.go:212] [ 1174: 1177] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:09.743302 700059 usertrap_amd64.go:122] [ 1174: 1177] Allocate a new trap: 0xc000d32510 11 D0713 05:28:09.743318 700059 usertrap_amd64.go:225] [ 1174: 1177] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:09.755634 700059 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.755694 700059 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc000d32510 12 D0713 05:28:09.755715 700059 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:09.755862 700059 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.755925 700059 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc000d32510 13 D0713 05:28:09.755948 700059 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:09.756274 700059 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.756312 700059 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc000d32510 14 D0713 05:28:09.756382 700059 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:09.756610 700059 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 05:28:09.756774 700059 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 05:28:09.766951 700059 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 05:28:09.767139 700059 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 05:28:09.773624 700059 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.773660 700059 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc000d32510 15 D0713 05:28:09.773676 700059 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 05:28:09.773741 700059 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.773763 700059 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.773790 700059 task_signals.go:204] [ 1174: 1175] Signal 1174, PID: 1175, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.773824 700059 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.773835 700059 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.773840 700059 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.773859 700059 task_signals.go:204] [ 1174: 1176] Signal 1174, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.773881 700059 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.773887 700059 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.773897 700059 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.773914 700059 task_signals.go:204] [ 1174: 1177] Signal 1174, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.773925 700059 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.773932 700059 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.773937 700059 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.773956 700059 task_signals.go:204] [ 1174: 1178] Signal 1174, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.773975 700059 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.773983 700059 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.773989 700059 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.774004 700059 task_signals.go:204] [ 1174: 1179] Signal 1174, PID: 1179, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.774026 700059 task_exit.go:204] [ 1174: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.775502 700059 task_exit.go:204] [ 1174: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.775767 700059 task_exit.go:204] [ 1174: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.775897 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.776020 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.776185 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.776474 700059 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.777514 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.779378 700059 syscalls.go:262] [ 1180: 1180] Allocating stack with size of 8388608 bytes D0713 05:28:09.779559 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.781865 700059 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.781922 700059 usertrap_amd64.go:106] [ 1180: 1180] Map a usertrap vma at 6a000 D0713 05:28:09.782101 700059 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000d32750 1 D0713 05:28:09.782151 700059 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:28:09.782998 700059 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.783062 700059 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000d32750 2 D0713 05:28:09.783089 700059 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:28:09.784373 700059 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.784411 700059 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000d32750 3 D0713 05:28:09.784430 700059 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:28:09.794192 700059 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.794245 700059 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000d32750 4 D0713 05:28:09.794269 700059 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:28:09.795693 700059 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.795735 700059 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000d32750 5 D0713 05:28:09.795758 700059 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:28:09.796103 700059 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.796180 700059 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000d32750 6 D0713 05:28:09.796209 700059 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:28:09.796697 700059 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.796738 700059 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000d32750 7 D0713 05:28:09.796765 700059 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:28:09.797156 700059 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.797185 700059 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc000d32750 8 D0713 05:28:09.797202 700059 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:28:09.797435 700059 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.797542 700059 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc000d32750 9 D0713 05:28:09.797645 700059 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:28:09.797804 700059 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.797847 700059 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000d32750 10 D0713 05:28:09.797867 700059 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:28:09.808392 700059 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.808463 700059 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc000d32750 11 D0713 05:28:09.808485 700059 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:28:09.808751 700059 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.808804 700059 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc000d32750 12 D0713 05:28:09.808835 700059 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:28:09.808930 700059 task_signals.go:470] [ 1180: 1180] Notified of signal 23 D0713 05:28:09.809024 700059 task_signals.go:220] [ 1180: 1180] Signal 23: delivering to handler D0713 05:28:09.812817 700059 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.813042 700059 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000d32750 13 D0713 05:28:09.813091 700059 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:28:09.819498 700059 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:09.819560 700059 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000d32750 14 D0713 05:28:09.819593 700059 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b6e0 trap addr 6a460 ([184 24 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:28:09.819470 700059 task_signals.go:470] [ 1180: 1180] Notified of signal 23 D0713 05:28:09.819692 700059 task_signals.go:220] [ 1180: 1180] Signal 23: delivering to handler D0713 05:28:09.826154 700059 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.826201 700059 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc000d32750 15 D0713 05:28:09.826220 700059 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 05:28:09.826311 700059 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.826341 700059 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.826379 700059 task_signals.go:204] [ 1180: 1184] Signal 1180, PID: 1184, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.826396 700059 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.826362 700059 task_signals.go:204] [ 1180: 1182] Signal 1180, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.826409 700059 task_signals.go:204] [ 1180: 1183] Signal 1180, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.826405 700059 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.826488 700059 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.826535 700059 task_signals.go:204] [ 1180: 1181] Signal 1180, PID: 1181, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.826585 700059 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.826642 700059 task_signals.go:204] [ 1180: 1185] Signal 1180, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.826672 700059 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.826688 700059 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.826732 700059 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.826774 700059 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.826792 700059 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.826812 700059 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.826823 700059 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.826828 700059 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.826838 700059 task_exit.go:204] [ 1180: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.828135 700059 task_exit.go:204] [ 1180: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.828168 700059 task_exit.go:204] [ 1180: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.828191 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.828236 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.828260 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.828420 700059 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.829230 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.831136 700059 syscalls.go:262] [ 1186: 1186] Allocating stack with size of 8388608 bytes D0713 05:28:09.831339 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.832731 700059 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.832789 700059 usertrap_amd64.go:106] [ 1186: 1186] Map a usertrap vma at 63000 D0713 05:28:09.832902 700059 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc0028e8a50 1 D0713 05:28:09.832990 700059 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:28:09.833414 700059 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.833433 700059 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc0028e8a50 2 D0713 05:28:09.833446 700059 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:28:09.833914 700059 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.833932 700059 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc0028e8a50 3 D0713 05:28:09.833944 700059 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:28:09.845395 700059 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.845433 700059 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc0028e8a50 4 D0713 05:28:09.845453 700059 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:28:09.846923 700059 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.846953 700059 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc0028e8a50 5 D0713 05:28:09.846965 700059 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:28:09.847018 700059 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.847026 700059 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc0028e8a50 6 D0713 05:28:09.847034 700059 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:28:09.847305 700059 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.847374 700059 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc0028e8a50 7 D0713 05:28:09.847399 700059 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:28:09.847720 700059 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.847794 700059 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc0028e8a50 8 D0713 05:28:09.847888 700059 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:28:09.847980 700059 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.848016 700059 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc0028e8a50 9 D0713 05:28:09.848047 700059 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:28:09.848277 700059 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:09.848294 700059 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc0028e8a50 10 D0713 05:28:09.848305 700059 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b6e0 trap addr 63320 ([184 24 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:28:09.848446 700059 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.848471 700059 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc0028e8a50 11 D0713 05:28:09.848483 700059 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46af76 trap addr 63370 ([184 35 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:28:09.859592 700059 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.859633 700059 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc0028e8a50 12 D0713 05:28:09.859654 700059 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:28:09.869840 700059 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.869978 700059 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc0028e8a50 13 D0713 05:28:09.870010 700059 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:28:09.871628 700059 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.871744 700059 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc0028e8a50 14 D0713 05:28:09.871818 700059 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:28:09.872005 700059 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.872034 700059 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc0028e8a50 15 D0713 05:28:09.872048 700059 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 05:28:09.872084 700059 task_signals.go:470] [ 1186: 1186] Notified of signal 23 D0713 05:28:09.872201 700059 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.872248 700059 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.872306 700059 task_signals.go:204] [ 1186: 1189] Signal 1186, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.872337 700059 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.872337 700059 task_signals.go:204] [ 1186: 1190] Signal 1186, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.872352 700059 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.872359 700059 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.872288 700059 task_signals.go:204] [ 1186: 1188] Signal 1186, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.872380 700059 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.872389 700059 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.872394 700059 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.872406 700059 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.872414 700059 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.872434 700059 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.872469 700059 task_signals.go:204] [ 1186: 1187] Signal 1186, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.872495 700059 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.873936 700059 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.873981 700059 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.874054 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.875067 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:09.875090 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.875236 700059 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.876309 700059 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.878691 700059 syscalls.go:262] [ 1191: 1191] Allocating stack with size of 8388608 bytes D0713 05:28:09.878902 700059 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.897586 700059 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.897677 700059 usertrap_amd64.go:106] [ 1191: 1191] Map a usertrap vma at 67000 D0713 05:28:09.897749 700059 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0018048d0 1 D0713 05:28:09.897782 700059 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:28:09.900102 700059 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.900144 700059 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0018048d0 2 D0713 05:28:09.900160 700059 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:28:09.901961 700059 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.902002 700059 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0018048d0 3 D0713 05:28:09.902017 700059 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:28:09.909731 700059 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.909782 700059 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0018048d0 4 D0713 05:28:09.909802 700059 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:28:09.911163 700059 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.911259 700059 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0018048d0 5 D0713 05:28:09.911305 700059 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:28:09.911571 700059 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.911673 700059 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0018048d0 6 D0713 05:28:09.911736 700059 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:28:09.918506 700059 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.918561 700059 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0018048d0 7 D0713 05:28:09.918582 700059 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:28:09.918822 700059 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.918848 700059 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc0018048d0 8 D0713 05:28:09.918862 700059 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:28:09.919355 700059 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.919381 700059 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0018048d0 9 D0713 05:28:09.919393 700059 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:28:09.919408 700059 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.919412 700059 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc0018048d0 10 D0713 05:28:09.919418 700059 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:28:09.927353 700059 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.927396 700059 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0018048d0 11 D0713 05:28:09.927412 700059 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:28:09.930902 700059 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.930930 700059 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc0018048d0 12 D0713 05:28:09.930947 700059 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:28:09.931004 700059 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.931022 700059 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc0018048d0 13 D0713 05:28:09.931039 700059 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:28:09.931181 700059 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 05:28:09.931270 700059 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 05:28:09.945478 700059 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 05:28:09.945716 700059 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 05:28:09.953017 700059 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:09.953063 700059 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0018048d0 14 D0713 05:28:09.953083 700059 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:28:09.953232 700059 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.953284 700059 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.953320 700059 task_signals.go:204] [ 1191: 1192] Signal 1191, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.953351 700059 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.953361 700059 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.953366 700059 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.953394 700059 task_signals.go:204] [ 1191: 1193] Signal 1191, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.953431 700059 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.953441 700059 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.953482 700059 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.953506 700059 task_signals.go:204] [ 1191: 1194] Signal 1191, PID: 1194, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.953529 700059 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.953539 700059 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.953544 700059 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.953561 700059 task_signals.go:204] [ 1191: 1195] Signal 1191, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:09.953580 700059 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:09.955050 700059 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:09.955075 700059 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.955090 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:09.955178 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:09.955279 700059 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:09.956283 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.958152 700059 syscalls.go:262] [ 1196: 1196] Allocating stack with size of 8388608 bytes D0713 05:28:09.958437 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:09.960460 700059 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:09.960506 700059 usertrap_amd64.go:106] [ 1196: 1196] Map a usertrap vma at 68000 D0713 05:28:09.961379 700059 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000a8c060 1 D0713 05:28:09.961424 700059 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:28:09.961848 700059 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:09.962003 700059 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000a8c060 2 D0713 05:28:09.962025 700059 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:28:09.962792 700059 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:09.962819 700059 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000a8c060 3 D0713 05:28:09.962830 700059 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:28:09.973006 700059 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:09.973065 700059 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000a8c060 4 D0713 05:28:09.973088 700059 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:28:09.974271 700059 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:09.974308 700059 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000a8c060 5 D0713 05:28:09.974323 700059 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:28:09.974361 700059 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b214:sysno 13 D0713 05:28:09.974370 700059 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000a8c060 6 D0713 05:28:09.974380 700059 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:28:09.974596 700059 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:09.974631 700059 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000a8c060 7 D0713 05:28:09.974642 700059 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:28:09.975024 700059 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:09.975168 700059 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000a8c060 8 D0713 05:28:09.975430 700059 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:28:09.975578 700059 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:09.975609 700059 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000a8c060 9 D0713 05:28:09.975622 700059 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:28:09.975866 700059 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46af76:sysno 35 D0713 05:28:09.975935 700059 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000a8c060 10 D0713 05:28:09.976172 700059 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:28:09.987205 700059 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46af29:sysno 293 D0713 05:28:09.987398 700059 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000a8c060 11 D0713 05:28:09.987487 700059 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:28:09.987584 700059 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b020:sysno 39 D0713 05:28:09.987644 700059 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000a8c060 12 D0713 05:28:09.987793 700059 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:28:09.987978 700059 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:09.988046 700059 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000a8c060 13 D0713 05:28:09.988092 700059 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:28:09.988190 700059 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0713 05:28:09.988352 700059 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0713 05:28:09.999446 700059 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0713 05:28:10.000287 700059 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0713 05:28:10.000885 700059 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0713 05:28:10.000936 700059 task_signals.go:179] [ 1196: 1196] Restarting syscall 202: interrupted by signal 23 D0713 05:28:10.001151 700059 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0713 05:28:10.001617 700059 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:10.001649 700059 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000a8c060 14 D0713 05:28:10.001667 700059 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:28:10.001843 700059 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:10.001887 700059 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:10.001923 700059 task_signals.go:204] [ 1196: 1198] Signal 1196, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:10.001939 700059 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:10.001948 700059 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:10.001954 700059 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:10.002102 700059 task_signals.go:204] [ 1196: 1199] Signal 1196, PID: 1199, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:10.002076 700059 task_signals.go:204] [ 1196: 1200] Signal 1196, PID: 1200, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:10.002126 700059 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:10.002141 700059 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:10.002176 700059 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:10.002203 700059 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:10.002215 700059 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:10.002225 700059 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:10.002170 700059 task_signals.go:204] [ 1196: 1197] Signal 1196, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:10.002306 700059 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:10.003856 700059 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:10.003887 700059 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:10.003902 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:10.004188 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:10.004277 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:10.004411 700059 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:10.005261 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) executing program D0713 05:28:10.007497 700059 syscalls.go:262] [ 1201: 1201] Allocating stack with size of 8388608 bytes D0713 05:28:10.007753 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:10.009080 700059 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:10.009127 700059 usertrap_amd64.go:106] [ 1201: 1201] Map a usertrap vma at 60000 D0713 05:28:10.009200 700059 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0006ea8a0 1 D0713 05:28:10.009238 700059 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:28:10.009500 700059 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:10.009514 700059 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0006ea8a0 2 D0713 05:28:10.009531 700059 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:28:10.010018 700059 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:10.010056 700059 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0006ea8a0 3 D0713 05:28:10.010068 700059 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:28:10.015715 700059 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:10.015805 700059 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0006ea8a0 4 D0713 05:28:10.015883 700059 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:28:10.017201 700059 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:10.017229 700059 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0006ea8a0 5 D0713 05:28:10.017262 700059 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:28:10.017364 700059 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b214:sysno 13 D0713 05:28:10.017540 700059 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0006ea8a0 6 D0713 05:28:10.017559 700059 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:28:10.018314 700059 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:10.018343 700059 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0006ea8a0 7 D0713 05:28:10.018355 700059 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:28:10.018582 700059 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:10.018612 700059 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0006ea8a0 8 D0713 05:28:10.018622 700059 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:28:10.018858 700059 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46af76:sysno 35 D0713 05:28:10.018886 700059 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0006ea8a0 9 D0713 05:28:10.018906 700059 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:28:10.019128 700059 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:10.019151 700059 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0006ea8a0 10 D0713 05:28:10.019162 700059 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:28:10.028109 700059 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46af29:sysno 293 D0713 05:28:10.028163 700059 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0006ea8a0 11 D0713 05:28:10.028183 700059 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:28:10.030551 700059 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b020:sysno 39 D0713 05:28:10.030593 700059 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0006ea8a0 12 D0713 05:28:10.030609 700059 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:28:10.030685 700059 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:10.030707 700059 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0006ea8a0 13 D0713 05:28:10.030718 700059 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:28:10.032390 700059 task_signals.go:470] [ 1201: 1201] Notified of signal 23 D0713 05:28:10.032475 700059 task_signals.go:220] [ 1201: 1201] Signal 23: delivering to handler D0713 05:28:10.040321 700059 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46ae44:sysno 231 D0713 05:28:10.040382 700059 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0006ea8a0 14 D0713 05:28:10.040416 700059 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:28:10.040479 700059 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:10.040511 700059 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:10.040557 700059 task_signals.go:204] [ 1201: 1202] Signal 1201, PID: 1202, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:10.040601 700059 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:10.040569 700059 task_signals.go:204] [ 1201: 1203] Signal 1201, PID: 1203, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:10.040613 700059 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:10.040640 700059 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:10.040684 700059 task_signals.go:204] [ 1201: 1204] Signal 1201, PID: 1204, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:10.040706 700059 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:10.040730 700059 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:10.040752 700059 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:10.040760 700059 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:10.040786 700059 task_signals.go:204] [ 1201: 1205] Signal 1201, PID: 1205, TID: 0, fault addr: 0x9: terminating thread group D0713 05:28:10.040807 700059 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:10.040967 700059 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:10.041002 700059 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:28:10.044708 700059 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:28:10.044758 700059 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:10.044817 700059 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:28:10.044870 700059 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:28:10.044884 700059 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:28:10.045072 700059 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:28:10.045963 700059 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:28:10.047817 700059 syscalls.go:262] [ 1206: 1206] Allocating stack with size of 8388608 bytes D0713 05:28:10.047965 700059 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:28:10.049066 700059 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b70f:sysno 204 D0713 05:28:10.049115 700059 usertrap_amd64.go:106] [ 1206: 1206] Map a usertrap vma at 65000 D0713 05:28:10.049242 700059 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc001804e10 1 D0713 05:28:10.049277 700059 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:28:10.049806 700059 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46ae93:sysno 257 D0713 05:28:10.049840 700059 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc001804e10 2 D0713 05:28:10.049856 700059 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:28:10.050603 700059 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b41d:sysno 9 D0713 05:28:10.050638 700059 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc001804e10 3 D0713 05:28:10.050653 700059 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:28:10.058426 700059 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b1d3:sysno 14 D0713 05:28:10.058621 700059 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc001804e10 4 D0713 05:28:10.058702 700059 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:28:10.058477 700059 sampler.go:191] Time: Adjusting syscall overhead down to 671 D0713 05:28:10.060104 700059 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46afa0:sysno 186 D0713 05:28:10.060148 700059 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc001804e10 5 D0713 05:28:10.060164 700059 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:28:10.060231 700059 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b214:sysno 13 D0713 05:28:10.060248 700059 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc001804e10 6 D0713 05:28:10.060258 700059 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:28:10.060862 700059 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b5eb:sysno 56 D0713 05:28:10.060879 700059 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc001804e10 7 D0713 05:28:10.060891 700059 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:28:10.061138 700059 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b60c:sysno 186 D0713 05:28:10.061242 700059 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc001804e10 8 D0713 05:28:10.061338 700059 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:28:10.061585 700059 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46af76:sysno 35 D0713 05:28:10.061603 700059 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc001804e10 9 D0713 05:28:10.061614 700059 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:28:10.061820 700059 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b57c:sysno 202 D0713 05:28:10.061840 700059 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc001804e10 10 D0713 05:28:10.061859 700059 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:28:10.062161 700059 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b6e0:sysno 24 D0713 05:28:10.062200 700059 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc001804e10 11 D0713 05:28:10.062265 700059 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:28:10.071609 700059 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46af29:sysno 293 D0713 05:28:10.071661 700059 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc001804e10 12 D0713 05:28:10.071681 700059 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:28:10.072841 700059 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b020:sysno 39 D0713 05:28:10.073005 700059 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc001804e10 13 D0713 05:28:10.073044 700059 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:28:10.073312 700059 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b04f:sysno 234 D0713 05:28:10.073335 700059 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc001804e10 14 D0713 05:28:10.073348 700059 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:28:10.073743 700059 task_signals.go:470] [ 1206: 1206] Notified of signal 23 D0713 05:28:10.085454 700059 task_signals.go:220] [ 1206: 1206] Signal 23: delivering to handler D0713 05:28:10.096227 700059 task_signals.go:309] [ 1206: 1206] failed to restore from a signal frame: bad address D0713 05:28:10.096299 700059 task_signals.go:470] [ 1206: 1206] Notified of signal 11 D0713 05:28:10.096322 700059 task_signals.go:220] [ 1206: 1206] Signal 11: delivering to handler W0713 05:28:10.123842 700214 util.go:64] FATAL ERROR: waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-cover-test-0": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-cover-test-0": urpc method "containerManager.WaitPID" failed: EOF W0713 05:28:10.124009 700214 main.go:274] Failure to execute command, err: 1 W0713 05:28:10.137814 700037 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-cover-test-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0713 05:28:10.137815 1 connection.go:127] sock read failed, closing connection: EOF I0713 05:28:10.137934 1 gofer.go:319] All lisafs servers exited. I0713 05:28:10.137966 1 main.go:265] Exiting with status: 0 D0713 05:28:10.141077 700037 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-cover-test-0 D0713 05:28:10.141141 700037 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-cover-test-0 D0713 05:28:10.141148 700037 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-cover-test-0 D0713 05:28:10.141154 700037 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.141281 700037 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-cover-test-0, PID: 700052 D0713 05:28:10.158900 700037 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.158983 700037 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.159065 700037 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.159106 700037 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.159148 700037 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.159191 700037 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.159231 700037 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.159289 700037 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.159308 700037 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.159323 700037 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.159377 700037 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.159465 700037 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.159484 700037 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-cover-test-0" D0713 05:28:10.159531 700037 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-cover-test-0" I0713 05:28:10.159867 700037 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0713 05:28:10.176619 701096 main.go:230] *************************** I0713 05:28:10.176692 701096 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-test-0] I0713 05:28:10.176722 701096 main.go:232] Version 0.0.0 I0713 05:28:10.176736 701096 main.go:233] GOOS: linux I0713 05:28:10.176750 701096 main.go:234] GOARCH: amd64 I0713 05:28:10.176771 701096 main.go:235] PID: 701096 I0713 05:28:10.176786 701096 main.go:236] UID: 0, GID: 0 I0713 05:28:10.176806 701096 main.go:237] Configuration: I0713 05:28:10.176820 701096 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root I0713 05:28:10.176840 701096 main.go:239] Platform: systrap I0713 05:28:10.176860 701096 main.go:240] FileAccess: shared I0713 05:28:10.176880 701096 main.go:241] Directfs: true I0713 05:28:10.176900 701096 main.go:242] Overlay: none I0713 05:28:10.176922 701096 main.go:243] Network: sandbox, logging: false I0713 05:28:10.177023 701096 main.go:244] Strace: false, max size: 1024, syscalls: I0713 05:28:10.177039 701096 main.go:245] IOURING: false I0713 05:28:10.177059 701096 main.go:246] Debug: true I0713 05:28:10.177090 701096 main.go:247] Systemd: false I0713 05:28:10.177117 701096 main.go:248] *************************** D0713 05:28:10.177172 701096 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 05:28:10.177314 701096 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist W0713 05:28:10.177415 701096 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-cover-test-0"]: exit status 128 I0713 05:28:10.176619 701096 main.go:230] *************************** I0713 05:28:10.176692 701096 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-test-0] I0713 05:28:10.176722 701096 main.go:232] Version 0.0.0 I0713 05:28:10.176736 701096 main.go:233] GOOS: linux I0713 05:28:10.176750 701096 main.go:234] GOARCH: amd64 I0713 05:28:10.176771 701096 main.go:235] PID: 701096 I0713 05:28:10.176786 701096 main.go:236] UID: 0, GID: 0 I0713 05:28:10.176806 701096 main.go:237] Configuration: I0713 05:28:10.176820 701096 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root I0713 05:28:10.176840 701096 main.go:239] Platform: systrap I0713 05:28:10.176860 701096 main.go:240] FileAccess: shared I0713 05:28:10.176880 701096 main.go:241] Directfs: true I0713 05:28:10.176900 701096 main.go:242] Overlay: none I0713 05:28:10.176922 701096 main.go:243] Network: sandbox, logging: false I0713 05:28:10.177023 701096 main.go:244] Strace: false, max size: 1024, syscalls: I0713 05:28:10.177039 701096 main.go:245] IOURING: false I0713 05:28:10.177059 701096 main.go:246] Debug: true I0713 05:28:10.177090 701096 main.go:247] Systemd: false I0713 05:28:10.177117 701096 main.go:248] *************************** D0713 05:28:10.177172 701096 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 05:28:10.177314 701096 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist W0713 05:28:10.177415 701096 main.go:274] Failure to execute command, err: 1 [11548303.445978] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.012030] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.078579] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.134946] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.388423] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.442059] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.509579] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.182613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.228614] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.249852] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.270396] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.080494] warn_bad_vsyscall: 69 callbacks suppressed [11548311.080498] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.131994] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.183761] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.207733] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548326.195752] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.033861] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.883771] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.718811] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.764692] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.802193] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.003147] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.061042] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.083321] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.123123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.557059] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.614792] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.654451] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.900936] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.950630] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548350.007839] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.826680] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.880328] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.934074] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.272328] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.322197] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.361580] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.288522] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.327273] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.370594] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.489698] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.541048] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.609626] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.631505] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.250609] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.296008] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.297139] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.354078] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.375823] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.830961] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.909476] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.972469] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.174820] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.216089] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548391.283262] warn_bad_vsyscall: 1 callbacks suppressed [11548391.283264] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.329989] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.374640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548393.205978] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.255260] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.299080] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.344484] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.405320] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.464950] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.467363] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.255243] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.318628] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.319151] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.399578] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.401766] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.568699] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.919607] warn_bad_vsyscall: 3 callbacks suppressed [11548416.919610] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.966950] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.989006] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548417.034408] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.811451] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.860253] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.886942] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.928112] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.778887] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.820893] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.842334] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880084] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880903] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.508111] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.601445] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.602653] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.704447] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.705345] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.826999] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872284] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872375] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.986065] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.258456] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.300258] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.349378] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548474.517614] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.564789] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.587128] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.638151] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548480.604311] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.644087] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.687806] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.689290] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548484.123787] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.180672] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.239780] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548493.278360] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328236] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328600] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.390304] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.833382] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.961149] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548509.063948] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548520.613294] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.659518] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.708570] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548526.299866] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.339536] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.402244] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.425302] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.894709] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.938050] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.982622] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.450297] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.505520] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.528534] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.568597] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548544.956800] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.013667] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.033643] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.085490] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548549.234345] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.282824] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.329949] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.534109] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.597324] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.621011] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.681465] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.886217] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.950142] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.998720] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.869926] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.934033] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.955035] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.014796] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.296125] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.353392] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.399746] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548570.911499] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.669130] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.735195] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.776546] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.660338] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.699761] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.746611] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.932572] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.972071] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.994399] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548597.034578] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.022991] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.090767] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.091012] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177700] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177834] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.557153] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.606340] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.653245] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.686798] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.776155] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.819898] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.872777] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.809818] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.860562] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.902531] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.707415] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.760809] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.817281] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.837170] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.856971] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.880580] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.901934] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.921867] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.942728] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.963710] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.234572] warn_bad_vsyscall: 60 callbacks suppressed [11548659.234577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.319640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.375122] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.395917] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.877517] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.920825] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.942925] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.984794] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548666.639541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.680685] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.721252] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548685.149430] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.193561] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.234314] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.259938] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.046303] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.090192] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.111864] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.155942] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.597615] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.643566] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.512636] warn_bad_vsyscall: 2 callbacks suppressed [11548693.512640] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.587898] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.622954] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.672410] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.860094] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.898007] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.935962] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.083950] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.139793] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.183343] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.433839] warn_bad_vsyscall: 4 callbacks suppressed [11548701.433843] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.486929] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.525603] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.154317] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.196722] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.240576] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.261222] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.863192] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.911865] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.965656] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.905248] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.941691] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.983975] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.279943] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.327248] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.389725] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.413266] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.107500] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.162576] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.212182] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.593451] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.640310] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.696914] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.087707] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.134560] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.378944] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.423937] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.443330] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.463024] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.482763] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.505914] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.525847] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.546368] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.567195] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.587657] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.371230] warn_bad_vsyscall: 29 callbacks suppressed [11548765.371234] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.416207] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.456858] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.014315] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.053783] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.097156] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548783.841479] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.890700] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.932657] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.698534] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.744861] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.765479] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.802565] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.823701] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548816.611166] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.660003] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.708264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.616862] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.656506] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.686639] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.730645] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.103497] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.175520] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.217584] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.239654] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.380393] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419346] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419914] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.482312] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.504801] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.673651] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548838.107208] warn_bad_vsyscall: 69 callbacks suppressed [11548838.107211] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.166865] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.212798] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.234075] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.515015] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573192] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573250] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.637396] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.856419] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.903599] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.043501] warn_bad_vsyscall: 3 callbacks suppressed [11548851.043505] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.091113] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.134490] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.651270] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.696335] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.749606] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.916650] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.958708] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548852.000342] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.093160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.147244] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.168810] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.275323] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.795133] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.856035] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.904442] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.933821] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.146784] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.215461] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.263431] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.250299] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.301702] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.322428] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.363670] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.387918] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.562614] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.605694] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.627575] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.667298] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.692069] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.739223] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.784533] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.785479] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.861757] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548914.066544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548920.546376] warn_bad_vsyscall: 3 callbacks suppressed [11548920.546380] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.598743] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.656217] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.789652] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.873526] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.930080] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.662584] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.704522] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.747412] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548941.905328] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.002937] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.026135] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.047304] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.070126] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.093651] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.118417] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.138954] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.161818] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.197908] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548947.008863] warn_bad_vsyscall: 29 callbacks suppressed [11548947.008867] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.117286] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.212764] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.279648] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.345439] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.439123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.226947] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.265920] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.306266] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.023857] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.083854] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.084666] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.162482] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.182136] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.202273] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.225957] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.248936] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.269819] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.291316] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.814852] warn_bad_vsyscall: 61 callbacks suppressed [11548984.814855] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.924203] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548999.981207] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.031437] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.075008] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.490779] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.548739] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.596976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.622828] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549003.408072] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.450273] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.493544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549011.127750] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.168732] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.204428] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.584759] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.637945] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.661027] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.703124] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.880815] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.931172] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.980221] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.112241] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.159181] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.184471] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.234060] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.289213] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.338880] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.384608] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.697534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.734874] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.790174] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.722197] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.769295] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.813981] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.670371] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.708511] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.749962] exe[743908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.269200] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.317692] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.341079] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.380507] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.807867] warn_bad_vsyscall: 1 callbacks suppressed [11549067.807871] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.870608] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.908220] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.669345] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.711360] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.754534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.604356] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.659869] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.706198] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549089.981820] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.040241] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.062834] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.120102] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549094.367870] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.417816] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.462962] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602597.777330] audit: type=1326 audit(1689206344.991:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602603.869164] audit: type=1326 audit(1689206351.083:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754999 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.285215] audit: type=1326 audit(1689206425.499:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=755000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.677713] audit: type=1326 audit(1689206425.891:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602696.843980] audit: type=1326 audit(1689206444.055:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=753602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602743.097537] audit: type=1326 audit(1689206490.311:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602743.122326] audit: type=1326 audit(1689206490.311:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602759.499374] audit: type=1326 audit(1689206506.710:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602854.344933] audit: type=1326 audit(1689206601.558:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602859.040813] audit: type=1326 audit(1689206606.254:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765875 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602884.867590] audit: type=1326 audit(1689206632.078:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=767807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602895.802192] audit: type=1326 audit(1689206643.014:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=750390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602921.417882] audit: type=1326 audit(1689206668.630:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602934.284216] audit: type=1326 audit(1689206681.494:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=763696 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602998.074154] audit: type=1326 audit(1689206745.286:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=771543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603001.490232] audit: type=1326 audit(1689206748.702:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772848 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603019.886473] exe[728911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603019.961263] exe[723449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.012456] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.033883] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.390766] audit: type=1326 audit(1689206767.602:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603082.847524] audit: type=1326 audit(1689206830.058:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=775665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603138.090907] audit: type=1326 audit(1689206885.302:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603172.298141] audit: type=1326 audit(1689206919.510:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777217 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603182.461434] audit: type=1326 audit(1689206929.674:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780255 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603243.896847] audit: type=1326 audit(1689206991.106:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603279.127507] audit: type=1326 audit(1689207026.338:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=787634 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603309.589653] audit: type=1326 audit(1689207056.802:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603335.471219] audit: type=1326 audit(1689207082.682:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=788938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603343.797267] audit: type=1326 audit(1689207091.010:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=790140 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603405.836680] audit: type=1326 audit(1689207153.046:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792319 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603420.441739] audit: type=1326 audit(1689207167.654:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603427.753376] audit: type=1326 audit(1689207174.966:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774364 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603505.176389] audit: type=1326 audit(1689207252.385:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796183 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603533.829677] audit: type=1326 audit(1689207281.041:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=797063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603562.278422] audit: type=1326 audit(1689207309.489:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603667.052521] audit: type=1326 audit(1689207414.261:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=805774 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603667.905373] audit: type=1326 audit(1689207415.113:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=807621 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603676.505802] audit: type=1326 audit(1689207423.717:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=806198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603684.820900] audit: type=1326 audit(1689207432.029:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=793728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603795.965747] audit: type=1326 audit(1689207543.177:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=812556 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603804.637990] audit: type=1326 audit(1689207551.849:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603810.551130] audit: type=1326 audit(1689207557.761:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810358 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603820.309874] audit: type=1326 audit(1689207567.521:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=811185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603836.504336] audit: type=1326 audit(1689207583.713:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=800972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603841.793876] audit: type=1326 audit(1689207589.005:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603870.199020] audit: type=1326 audit(1689207617.409:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603951.796356] audit: type=1326 audit(1689207699.005:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=816857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603957.195581] audit: type=1326 audit(1689207704.405:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817252 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603991.129069] audit: type=1326 audit(1689207738.337:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=819555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604091.585729] audit: type=1326 audit(1689207838.793:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604093.722432] audit: type=1326 audit(1689207840.933:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604119.143756] audit: type=1326 audit(1689207866.353:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=822836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604204.469045] audit: type=1326 audit(1689207951.676:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604217.655924] audit: type=1326 audit(1689207964.864:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=818547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604224.651590] audit: type=1326 audit(1689207971.860:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604234.352201] audit: type=1326 audit(1689207981.564:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604235.997704] audit: type=1326 audit(1689207983.208:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604256.614441] audit: type=1326 audit(1689208003.828:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604263.313503] audit: type=1326 audit(1689208010.524:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=828626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604308.646673] audit: type=1326 audit(1689208055.860:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831393 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604427.403379] audit: type=1326 audit(1689208174.616:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=833669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604450.026228] audit: type=1326 audit(1689208197.240:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=834371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604459.830108] audit: type=1326 audit(1689208207.040:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604476.678391] audit: type=1326 audit(1689208223.892:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829944 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604506.595388] audit: type=1326 audit(1689208253.808:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=836737 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604536.910472] audit: type=1326 audit(1689208284.124:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824480 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604588.801578] audit: type=1326 audit(1689208336.012:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604590.878115] audit: type=1326 audit(1689208338.088:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604613.330191] audit: type=1326 audit(1689208360.540:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=849945 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604648.014559] audit: type=1326 audit(1689208395.228:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=844081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604655.910760] audit: type=1326 audit(1689208403.124:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604731.191216] audit: type=1326 audit(1689208478.404:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=841978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604750.453981] audit: type=1326 audit(1689208497.664:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850369 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604790.297089] audit: type=1326 audit(1689208537.508:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=851838 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604911.917454] audit: type=1326 audit(1689208659.128:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=855574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604932.248331] audit: type=1326 audit(1689208679.459:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=856349 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604979.039220] audit: type=1326 audit(1689208726.251:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=854027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605001.217428] audit: type=1326 audit(1689208748.427:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605004.825105] audit: type=1326 audit(1689208752.035:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605073.388168] audit: type=1326 audit(1689208820.599:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605073.905125] audit: type=1326 audit(1689208821.115:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861403 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605096.082181] audit: type=1326 audit(1689208843.291:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605129.878423] audit: type=1326 audit(1689208877.087:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=866278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605177.031421] audit: type=1326 audit(1689208924.243:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865008 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605235.963087] exe[867632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bc192d40a cs:33 sp:7f06f0682ee8 ax:12 si:ffffffffff600000 di:559bc1999ff2 [11605242.250840] audit: type=1326 audit(1689208989.459:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605259.396277] exe[729169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.444946] exe[734784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.493436] exe[735065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605345.057961] audit: type=1326 audit(1689209092.267:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=867457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605366.290442] audit: type=1326 audit(1689209113.499:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=872748 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605379.568477] audit: type=1326 audit(1689209126.779:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=868919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605400.381802] audit: type=1326 audit(1689209147.591:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873868 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605499.168636] audit: type=1326 audit(1689209246.379:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873036 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605641.112938] audit: type=1326 audit(1689209388.322:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=878736 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605650.594619] audit: type=1326 audit(1689209397.802:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879055 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605769.011148] audit: type=1326 audit(1689209516.218:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897739 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605783.192934] audit: type=1326 audit(1689209530.402:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=888577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605785.006125] audit: type=1326 audit(1689209532.214:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=874679 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605792.566409] audit: type=1326 audit(1689209539.774:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=899333 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605803.584285] audit: type=1326 audit(1689209550.794:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=889127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605917.107175] audit: type=1326 audit(1689209664.314:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=900168 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605999.175587] audit: type=1326 audit(1689209746.386:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=903724 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606057.989861] audit: type=1326 audit(1689209805.198:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=908771 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606081.023977] audit: type=1326 audit(1689209828.234:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901681 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606081.049199] audit: type=1326 audit(1689209828.234:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606140.480349] audit: type=1326 audit(1689209887.690:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606161.551475] audit: type=1326 audit(1689209908.758:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606199.187532] audit: type=1326 audit(1689209946.394:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=916010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606218.913397] audit: type=1326 audit(1689209966.122:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922661 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606232.077547] audit: type=1326 audit(1689209979.282:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=923826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606380.343966] audit: type=1326 audit(1689210127.553:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606411.655428] audit: type=1326 audit(1689210158.861:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927181 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606523.891076] audit: type=1326 audit(1689210271.097:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606544.833841] audit: type=1326 audit(1689210292.041:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932874 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606553.082384] audit: type=1326 audit(1689210300.289:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=934463 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606576.113741] audit: type=1326 audit(1689210323.321:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=939578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606603.669625] audit: type=1326 audit(1689210350.877:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918032 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606666.104511] audit: type=1326 audit(1689210413.313:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=938428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606700.273078] audit: type=1326 audit(1689210447.481:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606722.409710] audit: type=1326 audit(1689210469.617:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=944587 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606723.591484] audit: type=1326 audit(1689210470.797:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918004 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606726.625428] audit: type=1326 audit(1689210473.833:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=925543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606749.842751] audit: type=1326 audit(1689210497.049:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=945425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606774.216268] audit: type=1326 audit(1689210521.421:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606775.272993] audit: type=1326 audit(1689210522.481:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946844 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606808.022043] audit: type=1326 audit(1689210555.229:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=942712 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606825.235825] audit: type=1326 audit(1689210572.441:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=943616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606903.854733] audit: type=1326 audit(1689210651.061:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=951196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606950.408866] audit: type=1326 audit(1689210697.617:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607046.030686] audit: type=1326 audit(1689210793.237:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=955433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607082.153088] audit: type=1326 audit(1689210829.361:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=963715 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607091.177801] audit: type=1326 audit(1689210838.384:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607204.949220] audit: type=1326 audit(1689210952.160:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961511 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607214.149455] audit: type=1326 audit(1689210961.360:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607234.203101] audit: type=1326 audit(1689210981.412:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=965279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607246.591122] audit: type=1326 audit(1689210993.800:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607346.908337] audit: type=1326 audit(1689211094.116:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607347.810535] audit: type=1326 audit(1689211095.020:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=976275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607373.022204] audit: type=1326 audit(1689211120.232:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607377.243731] audit: type=1326 audit(1689211124.452:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969402 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607487.048913] audit: type=1326 audit(1689211234.256:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946299 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607489.734138] audit: type=1326 audit(1689211236.944:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977298 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607499.561410] audit: type=1326 audit(1689211246.772:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607519.191537] audit: type=1326 audit(1689211266.400:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607624.457049] audit: type=1326 audit(1689211371.664:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=985128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607631.705291] audit: type=1326 audit(1689211378.916:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=983126 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607638.204050] audit: type=1326 audit(1689211385.412:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979517 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607751.083724] audit: type=1326 audit(1689211498.292:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=989206 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607766.193883] audit: type=1326 audit(1689211513.404:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988722 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607770.820805] audit: type=1326 audit(1689211518.028:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=972203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607889.548013] audit: type=1326 audit(1689211636.755:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=995356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607890.272191] audit: type=1326 audit(1689211637.479:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984084 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607892.217788] audit: type=1326 audit(1689211639.427:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=994449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607973.414133] audit: type=1326 audit(1689211720.623:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607997.840992] audit: type=1326 audit(1689211745.047:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608009.823096] exe[880088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.862814] exe[908958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.905875] exe[880060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7a7858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608031.274871] audit: type=1326 audit(1689211778.483:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998191 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608034.038701] audit: type=1326 audit(1689211781.247:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998422 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608075.873755] audit: type=1326 audit(1689211823.083:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992937 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608174.269361] audit: type=1326 audit(1689211921.475:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608175.997697] audit: type=1326 audit(1689211923.203:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608317.934996] audit: type=1326 audit(1689212065.143:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16671 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608318.010584] audit: type=1326 audit(1689212065.219:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16326 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608345.573784] audit: type=1326 audit(1689212092.779:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11133 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608451.296340] audit: type=1326 audit(1689212198.503:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29829 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608460.035472] audit: type=1326 audit(1689212207.243:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608462.176738] audit: type=1326 audit(1689212209.383:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25141 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608503.267767] audit: type=1326 audit(1689212250.475:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=34498 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608533.390892] audit: type=1326 audit(1689212280.598:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999989 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608586.343765] audit: type=1326 audit(1689212333.550:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11132 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608603.172815] audit: type=1326 audit(1689212350.378:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608604.375648] audit: type=1326 audit(1689212351.582:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608625.227797] audit: type=1326 audit(1689212372.434:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608653.653041] audit: type=1326 audit(1689212400.858:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996310 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608746.810007] audit: type=1326 audit(1689212494.014:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608759.068622] audit: type=1326 audit(1689212506.274:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608844.060417] audit: type=1326 audit(1689212591.266:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47509 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608849.979155] audit: type=1326 audit(1689212597.186:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26927 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608866.192620] audit: type=1326 audit(1689212613.398:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50432 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608900.419588] audit: type=1326 audit(1689212647.626:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=48313 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609041.941064] audit: type=1326 audit(1689212789.146:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609043.267962] audit: type=1326 audit(1689212790.474:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=51808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609101.039399] exe[19846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.200826] exe[42029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.233088] exe[21925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.359654] exe[14202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609114.859756] audit: type=1326 audit(1689212862.066:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=53392 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609136.468568] audit: type=1326 audit(1689212883.674:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=63106 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609184.539557] audit: type=1326 audit(1689212931.746:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55835 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609224.389789] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.508861] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.664605] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.692561] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.721718] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.758715] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.820055] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.852642] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.874621] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.926286] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609296.412170] audit: type=1326 audit(1689213043.617:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=38807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609346.942415] audit: type=1326 audit(1689213094.145:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=67199 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609386.199827] audit: type=1326 audit(1689213133.405:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=70379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609407.497500] audit: type=1326 audit(1689213154.701:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=80674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609489.512442] audit: type=1326 audit(1689213236.717:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=78397 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609536.734812] audit: type=1326 audit(1689213283.937:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=44670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609540.467947] audit: type=1326 audit(1689213287.673:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609578.029249] audit: type=1326 audit(1689213325.233:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609580.700973] audit: type=1326 audit(1689213327.905:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609630.673391] audit: type=1326 audit(1689213377.877:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609672.894466] audit: type=1326 audit(1689213420.097:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609673.764769] audit: type=1326 audit(1689213420.969:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56076 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609682.185992] audit: type=1326 audit(1689213429.389:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=93458 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609689.245620] audit: type=1326 audit(1689213436.449:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=39787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609704.620136] audit: type=1326 audit(1689213451.825:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103151 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609718.303851] audit: type=1326 audit(1689213465.509:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609732.024113] audit: type=1326 audit(1689213479.229:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609746.654594] audit: type=1326 audit(1689213493.857:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=99508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609891.802556] audit: type=1326 audit(1689213639.005:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=107746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609980.959613] audit: type=1326 audit(1689213728.164:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=111400 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610037.921958] warn_bad_vsyscall: 57 callbacks suppressed [11610037.921961] exe[104886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cf1f3e40a cs:33 sp:7f9740193ee8 ax:12 si:ffffffffff600000 di:557cf1faaff2 [11610091.078793] audit: type=1326 audit(1689213838.284:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=114972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610124.942162] audit: type=1326 audit(1689213872.148:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610177.285395] audit: type=1326 audit(1689213924.492:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102441 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610193.441605] audit: type=1326 audit(1689213940.648:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610225.810101] audit: type=1326 audit(1689213973.016:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123167 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610233.553409] audit: type=1326 audit(1689213980.760:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=121916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610256.024194] audit: type=1326 audit(1689214003.232:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128638 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610300.269297] audit: type=1326 audit(1689214047.476:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610367.800104] audit: type=1326 audit(1689214115.008:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128262 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610392.269170] audit: type=1326 audit(1689214139.476:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=129506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610463.704357] audit: type=1326 audit(1689214210.912:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610509.525530] audit: type=1326 audit(1689214256.732:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=133363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610534.233051] audit: type=1326 audit(1689214281.440:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=134147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610535.552490] audit: type=1326 audit(1689214282.760:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102360 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610558.818901] audit: type=1326 audit(1689214306.024:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138968 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610563.001154] audit: type=1326 audit(1689214310.208:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125930 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610652.067752] audit: type=1326 audit(1689214399.272:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610675.976391] audit: type=1326 audit(1689214423.180:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138768 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610794.201252] audit: type=1326 audit(1689214541.407:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146110 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610817.416788] audit: type=1326 audit(1689214564.623:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=147787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610824.164743] audit: type=1326 audit(1689214571.371:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610917.045624] audit: type=1326 audit(1689214664.247:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=155879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610935.100843] audit: type=1326 audit(1689214682.307:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=154665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610957.386648] audit: type=1326 audit(1689214704.591:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=160285 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611044.973755] audit: type=1326 audit(1689214792.179:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104427 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611052.355082] exe[161359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.396817] exe[161402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.417215] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.458817] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9dd858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611057.686547] audit: type=1326 audit(1689214804.891:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159476 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611080.561894] audit: type=1326 audit(1689214827.767:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611091.751769] audit: type=1326 audit(1689214838.955:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=163210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611106.510657] audit: type=1326 audit(1689214853.715:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164175 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611206.621679] audit: type=1326 audit(1689214953.827:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162899 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611226.105804] audit: type=1326 audit(1689214973.311:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=157532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611328.860902] audit: type=1326 audit(1689215076.067:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=136219 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611349.685728] audit: type=1326 audit(1689215096.891:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166089 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611355.989960] audit: type=1326 audit(1689215103.195:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611470.897001] exe[173131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611470.982692] exe[172685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611471.068495] exe[172788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611491.624312] audit: type=1326 audit(1689215238.826:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611498.281194] audit: type=1326 audit(1689215245.486:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171656 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611545.887586] audit: type=1326 audit(1689215293.090:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611556.965422] audit: type=1326 audit(1689215304.170:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611636.098091] audit: type=1326 audit(1689215383.302:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611641.171130] audit: type=1326 audit(1689215388.374:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176464 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611712.598686] audit: type=1326 audit(1689215459.802:770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611779.405216] audit: type=1326 audit(1689215526.606:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=183629 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611784.275845] audit: type=1326 audit(1689215531.478:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611807.175705] audit: type=1326 audit(1689215554.378:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=139924 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611845.278909] exe[175719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.131823] exe[175495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.132343] exe[62220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.255247] exe[192224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611865.951902] exe[193267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96258cee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.843870] exe[194427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.849440] exe[193278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.684536] exe[193231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.685047] exe[193276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611923.773068] audit: type=1326 audit(1689215670.974:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611927.131634] audit: type=1326 audit(1689215674.334:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192265 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611946.855512] audit: type=1326 audit(1689215694.058:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612069.445142] audit: type=1326 audit(1689215816.646:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199539 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612092.184084] audit: type=1326 audit(1689215839.386:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205940 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612109.628298] audit: type=1326 audit(1689215856.830:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=167586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612169.655524] audit: type=1326 audit(1689215916.857:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=179867 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612196.158283] audit: type=1326 audit(1689215943.361:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612321.757529] audit: type=1326 audit(1689216068.961:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612338.198911] audit: type=1326 audit(1689216085.401:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210033 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612341.930437] audit: type=1326 audit(1689216089.133:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612480.723412] audit: type=1326 audit(1689216227.925:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612484.182272] audit: type=1326 audit(1689216231.385:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215515 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612623.704171] audit: type=1326 audit(1689216370.905:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612627.491761] audit: type=1326 audit(1689216374.693:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219947 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612650.811661] audit: type=1326 audit(1689216398.017:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612725.881937] audit: type=1326 audit(1689216473.081:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215502 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612768.073479] audit: type=1326 audit(1689216515.273:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612911.907957] exe[230755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784c9cc40a cs:33 sp:7f8d98f46ee8 ax:12 si:ffffffffff600000 di:55784ca38ff2 [11612912.026179] audit: type=1326 audit(1689216659.232:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=229411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612928.029305] audit: type=1326 audit(1689216675.232:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612933.884371] audit: type=1326 audit(1689216681.088:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=237418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613007.977947] audit: type=1326 audit(1689216755.180:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242949 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613034.707467] exe[210137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed66be340a cs:33 sp:7fd40805cee8 ax:12 si:ffffffffff600000 di:55ed66c4fff2 [11613067.683364] audit: type=1326 audit(1689216814.888:796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=238399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613090.757129] audit: type=1326 audit(1689216837.960:797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613156.842452] audit: type=1326 audit(1689216904.048:798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162031 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613176.892347] audit: type=1326 audit(1689216924.096:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613225.327240] audit: type=1326 audit(1689216972.532:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613257.820594] audit: type=1326 audit(1689217005.024:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248201 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613259.764460] exe[113089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.896766] exe[129485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.994509] exe[113108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613260.035649] exe[167068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613367.064209] audit: type=1326 audit(1689217114.268:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=257164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613389.920266] audit: type=1326 audit(1689217137.124:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=265247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613400.171681] audit: type=1326 audit(1689217147.376:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=261413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613423.461311] audit: type=1326 audit(1689217170.664:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=267746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613556.820936] audit: type=1326 audit(1689217304.024:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=269567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613639.322076] audit: type=1326 audit(1689217386.523:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=271970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613662.359245] audit: type=1326 audit(1689217409.563:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=279508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613699.545408] audit: type=1326 audit(1689217446.747:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=274933 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613729.742873] audit: type=1326 audit(1689217476.947:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=227591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11613758.457839] audit: type=1326 audit(1689217505.659:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=208877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613841.828755] audit: type=1326 audit(1689217589.031:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613865.039411] audit: type=1326 audit(1689217612.243:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=285941 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613909.215817] exe[280649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613909.285023] exe[281621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613910.102687] exe[280647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613911.927175] audit: type=1326 audit(1689217659.131:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=283958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613926.880021] audit: type=1326 audit(1689217674.083:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=250982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613951.214334] audit: type=1326 audit(1689217698.415:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613994.384142] audit: type=1326 audit(1689217741.587:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=289847 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614054.357636] audit: type=1326 audit(1689217801.559:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614197.565657] audit: type=1326 audit(1689217944.767:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293965 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614243.930801] audit: type=1326 audit(1689217991.131:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295865 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614340.962187] audit: type=1326 audit(1689218088.162:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614378.700022] audit: type=1326 audit(1689218125.902:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302653 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614436.168021] audit: type=1326 audit(1689218183.370:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=306526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614488.028688] audit: type=1326 audit(1689218235.230:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614531.437813] audit: type=1326 audit(1689218278.638:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=313198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614546.864834] audit: type=1326 audit(1689218294.066:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319188 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614567.377282] audit: type=1326 audit(1689218314.578:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=299618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614623.636542] audit: type=1326 audit(1689218370.838:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614629.720322] audit: type=1326 audit(1689218376.922:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614697.032081] audit: type=1326 audit(1689218444.234:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614708.565361] audit: type=1326 audit(1689218455.766:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=321370 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614725.059201] audit: type=1326 audit(1689218472.258:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614725.083797] audit: type=1326 audit(1689218472.270:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614763.316197] audit: type=1326 audit(1689218510.518:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614783.657848] audit: type=1326 audit(1689218530.858:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.377379] audit: type=1326 audit(1689218572.578:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.954441] audit: type=1326 audit(1689218573.154:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614826.473984] audit: type=1326 audit(1689218573.674:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614849.192210] audit: type=1326 audit(1689218596.394:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347434 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614869.432839] audit: type=1326 audit(1689218616.634:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614904.547842] audit: type=1326 audit(1689218651.746:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614919.904813] audit: type=1326 audit(1689218667.106:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344659 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614989.331061] audit: type=1326 audit(1689218736.530:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615026.778194] audit: type=1326 audit(1689218773.978:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615046.792010] audit: type=1326 audit(1689218793.989:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=353766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615075.957721] audit: type=1326 audit(1689218823.157:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=355648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615092.070251] audit: type=1326 audit(1689218839.269:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615105.006673] audit: type=1326 audit(1689218852.205:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615115.088959] audit: type=1326 audit(1689218862.289:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=374087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615140.436699] audit: type=1326 audit(1689218887.637:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=379563 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615189.321653] audit: type=1326 audit(1689218936.521:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=369018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615249.883397] audit: type=1326 audit(1689218997.081:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=377300 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615278.181181] audit: type=1326 audit(1689219025.381:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=365614 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615285.687507] audit: type=1326 audit(1689219032.885:854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383294 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615334.361923] audit: type=1326 audit(1689219081.561:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=386918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615358.021042] audit: type=1326 audit(1689219105.221:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=397046 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615372.830891] audit: type=1326 audit(1689219120.029:857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615392.629913] audit: type=1326 audit(1689219139.829:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=391869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615418.819110] audit: type=1326 audit(1689219166.017:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615534.998711] audit: type=1326 audit(1689219282.197:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615536.639688] audit: type=1326 audit(1689219283.837:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.252941] audit: type=1326 audit(1689219319.453:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.566380] audit: type=1326 audit(1689219319.765:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=402658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615607.239874] audit: type=1326 audit(1689219354.437:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=404197 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615682.174935] audit: type=1326 audit(1689219429.373:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=395486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615749.676438] audit: type=1326 audit(1689219496.873:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=409554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615772.856758] audit: type=1326 audit(1689219520.056:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=415966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615782.603424] audit: type=1326 audit(1689219529.800:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=393960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615837.996675] audit: type=1326 audit(1689219585.196:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414088 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.905148] audit: type=1326 audit(1689219603.108:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.959406] audit: type=1326 audit(1689219603.160:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414743 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615907.170690] audit: type=1326 audit(1689219654.372:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616016.968741] audit: type=1326 audit(1689219764.168:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419234 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616018.174727] audit: type=1326 audit(1689219765.376:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419205 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616049.790873] audit: type=1326 audit(1689219796.992:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420016 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616179.467941] audit: type=1326 audit(1689219926.668:876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616180.555813] audit: type=1326 audit(1689219927.756:877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616192.430465] audit: type=1326 audit(1689219939.632:878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616204.730256] audit: type=1326 audit(1689219951.932:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426323 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616215.467880] audit: type=1326 audit(1689219962.668:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426686 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616342.057416] audit: type=1326 audit(1689220089.260:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616344.197343] audit: type=1326 audit(1689220091.400:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427038 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616349.922513] audit: type=1326 audit(1689220097.124:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616463.003124] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117536ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.155216] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec1174f4ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.334664] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.365978] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.395492] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.434812] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.469559] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.499013] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.528098] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.559286] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.856088] audit: type=1326 audit(1689220211.056:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433896 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616468.036730] warn_bad_vsyscall: 56 callbacks suppressed [11616468.036733] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.143022] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.346868] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.476775] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.602391] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.747206] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.905526] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.069465] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.228264] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.373763] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616478.212932] audit: type=1326 audit(1689220225.412:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=399179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616486.892502] audit: type=1326 audit(1689220234.092:886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616504.636883] audit: type=1326 audit(1689220251.835:887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434647 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616506.387296] audit: type=1326 audit(1689220253.587:888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616618.325394] audit: type=1326 audit(1689220365.523:889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616624.272672] audit: type=1326 audit(1689220371.471:890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616641.156448] audit: type=1326 audit(1689220388.355:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616646.887273] audit: type=1326 audit(1689220394.087:892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416646 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616669.130945] audit: type=1326 audit(1689220416.331:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616671.357319] audit: type=1326 audit(1689220418.555:894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616685.822247] audit: type=1326 audit(1689220433.023:895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426318 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616727.733883] warn_bad_vsyscall: 14 callbacks suppressed [11616727.733887] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.854758] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.896011] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.024074] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.060517] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.174456] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.285948] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.286187] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.433658] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.542871] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.745666] warn_bad_vsyscall: 149 callbacks suppressed [11616732.745670] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.778992] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.807892] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.837387] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.866886] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.895047] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.005828] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.156311] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.302872] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.344866] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.937508] warn_bad_vsyscall: 156 callbacks suppressed [11616737.937511] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.978420] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.107496] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.221153] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.332316] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.371403] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.516981] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.646772] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.793750] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.925501] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616742.938460] warn_bad_vsyscall: 95 callbacks suppressed [11616742.938463] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.139113] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.249995] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.287426] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.799359] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.961896] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.123243] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.277308] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.579977] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.680400] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.059194] warn_bad_vsyscall: 179 callbacks suppressed [11616748.059198] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.099340] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.218641] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.353244] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.514493] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.675188] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.816625] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616748.957631] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.061746] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.178713] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.071882] warn_bad_vsyscall: 129 callbacks suppressed [11616753.071903] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.188917] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.305604] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.308145] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.434246] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.463792] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.573550] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.690786] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.948656] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616754.057794] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.088841] warn_bad_vsyscall: 69 callbacks suppressed [11616758.088845] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.198407] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.325846] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.452371] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.611864] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.848362] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.023674] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.223697] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.378129] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.414350] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.247975] warn_bad_vsyscall: 67 callbacks suppressed [11616763.247978] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.379531] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.506568] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.576974] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.712296] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.868809] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.012072] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.044986] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.075153] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.105612] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.632673] warn_bad_vsyscall: 72 callbacks suppressed [11616768.632677] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.764563] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.797201] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.945297] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.977094] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.105815] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.219603] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.319274] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.446879] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.586043] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.407661] warn_bad_vsyscall: 20 callbacks suppressed [11616774.407665] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.443917] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.480792] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.515412] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.549287] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.577325] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.615687] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.650789] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.680564] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.712742] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.732922] warn_bad_vsyscall: 59 callbacks suppressed [11616779.732927] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.873482] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.015511] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.144019] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.148245] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.292227] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.408584] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.554021] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.587092] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.707671] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616831.354738] audit: type=1326 audit(1689220578.555:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616849.536866] audit: type=1326 audit(1689220596.735:897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616891.400048] audit: type=1326 audit(1689220638.599:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616955.867342] audit: type=1326 audit(1689220703.067:899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616993.610115] audit: type=1326 audit(1689220740.811:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448725 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617027.425260] warn_bad_vsyscall: 1 callbacks suppressed [11617027.425263] exe[423335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559734aa5839 cs:33 sp:7f1166de5ee8 ax:0 si:20000240 di:ffffffffff600000 [11617031.423364] audit: type=1326 audit(1689220778.623:901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617034.068901] audit: type=1326 audit(1689220781.267:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=450336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617036.395177] exe[403877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2071a9839 cs:33 sp:7f1205849ee8 ax:0 si:20000240 di:ffffffffff600000 [11617110.112230] exe[450940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563710d72839 cs:33 sp:7fb6768c9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617120.897024] audit: type=1326 audit(1689220868.095:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=452760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617155.771686] audit: type=1326 audit(1689220902.971:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617163.858912] audit: type=1326 audit(1689220911.059:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=456904 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617173.909893] audit: type=1326 audit(1689220921.107:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=359483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617177.166434] audit: type=1326 audit(1689220924.363:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453803 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617199.530594] audit: type=1326 audit(1689220946.731:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458135 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617242.071168] exe[456653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d54535f839 cs:33 sp:7fddbdecbee8 ax:0 si:20000240 di:ffffffffff600000 [11617242.806185] exe[452415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7ccdb9839 cs:33 sp:7f37b6bf9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617285.999616] exe[453136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55772e5b8839 cs:33 sp:7ea5ab3feee8 ax:0 si:20000240 di:ffffffffff600000 [11617310.725595] exe[352485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564403af1839 cs:33 sp:7fe27b9feee8 ax:0 si:20000240 di:ffffffffff600000 [11617320.633665] audit: type=1326 audit(1689221067.830:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617333.963647] audit: type=1326 audit(1689221081.162:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617344.534053] exe[456677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6142f839 cs:33 sp:7fcfb7eebee8 ax:0 si:20000240 di:ffffffffff600000 [11617407.485335] audit: type=1326 audit(1689221154.682:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617407.510562] audit: type=1326 audit(1689221154.682:912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617450.603853] audit: type=1326 audit(1689221197.802:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444772 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617458.156564] exe[464010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55932fcf1839 cs:33 sp:7fadc19c2ee8 ax:0 si:20000240 di:ffffffffff600000 [11617470.363479] exe[373491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56224fbf2839 cs:33 sp:7f9f309ccee8 ax:0 si:20000240 di:ffffffffff600000 [11617473.971610] audit: type=1326 audit(1689221221.170:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617475.605465] exe[461182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796b1a858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.707828] exe[462051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.818558] exe[462052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617485.057212] audit: type=1326 audit(1689221232.254:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617570.056481] audit: type=1326 audit(1689221317.254:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=465697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617597.277555] audit: type=1326 audit(1689221344.474:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617616.134916] exe[368535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b36f85f839 cs:33 sp:7ecb96446ee8 ax:0 si:20000240 di:ffffffffff600000 [11617648.439900] audit: type=1326 audit(1689221395.638:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=467841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617678.970527] audit: type=1326 audit(1689221426.166:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=457982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617700.643689] audit: type=1326 audit(1689221447.842:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617732.017925] audit: type=1326 audit(1689221479.214:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469314 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617738.589958] audit: type=1326 audit(1689221485.786:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466971 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617740.351068] audit: type=1326 audit(1689221487.550:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617792.775079] exe[470535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93a6ea839 cs:33 sp:7ea8e19feee8 ax:0 si:20000240 di:ffffffffff600000 [11617809.463896] audit: type=1326 audit(1689221556.662:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470733 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617812.958637] exe[473479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578a49e9839 cs:33 sp:7f4af18abee8 ax:0 si:20000240 di:ffffffffff600000 [11617850.443757] audit: type=1326 audit(1689221597.642:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617882.299739] audit: type=1326 audit(1689221629.498:926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617893.147005] audit: type=1326 audit(1689221640.346:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=473353 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617934.186694] audit: type=1326 audit(1689221681.382:928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617983.641154] audit: type=1326 audit(1689221730.833:929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618007.754035] exe[479109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc7088839 cs:33 sp:7f115bb4aee8 ax:0 si:20000240 di:ffffffffff600000 [11618023.408403] exe[477266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.501534] exe[471958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.601684] exe[471707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618024.400520] audit: type=1326 audit(1689221771.597:930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=477359 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618074.174434] audit: type=1326 audit(1689221821.369:931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618146.086115] audit: type=1326 audit(1689221893.281:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=480365 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618165.619972] audit: type=1326 audit(1689221912.817:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.009828] audit: type=1326 audit(1689221982.205:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437493 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.035898] audit: type=1326 audit(1689221982.233:935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=485075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618257.120281] audit: type=1326 audit(1689222004.317:936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618306.553982] audit: type=1326 audit(1689222053.749:937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618309.160749] audit: type=1326 audit(1689222056.357:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618328.009567] audit: type=1326 audit(1689222075.205:939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=491196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618396.215364] audit: type=1326 audit(1689222143.413:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618458.057109] audit: type=1326 audit(1689222205.253:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618471.167306] audit: type=1326 audit(1689222218.365:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493625 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618558.971085] audit: type=1326 audit(1689222306.165:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=498306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618599.005616] audit: type=1326 audit(1689222346.201:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500998 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618614.605767] audit: type=1326 audit(1689222361.801:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471350 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618616.160870] audit: type=1326 audit(1689222363.357:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453695 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618632.621352] audit: type=1326 audit(1689222379.817:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=502952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618740.688253] audit: type=1326 audit(1689222487.888:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618794.782232] audit: type=1326 audit(1689222541.980:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=516208 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618828.244900] audit: type=1326 audit(1689222575.444:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442795 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618883.250327] audit: type=1326 audit(1689222630.448:951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=527662 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618905.654237] audit: type=1326 audit(1689222652.852:952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=539741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618955.994306] audit: type=1326 audit(1689222703.192:953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618991.070845] audit: type=1326 audit(1689222738.268:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618995.914657] exe[531498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae92ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.576485] exe[545055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.698654] exe[515605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618998.466088] audit: type=1326 audit(1689222745.664:955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545946 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619039.105891] audit: type=1326 audit(1689222786.304:956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=540251 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619081.481628] audit: type=1326 audit(1689222828.680:957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472579 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619132.788973] audit: type=1326 audit(1689222879.988:958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=546430 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619169.205197] audit: type=1326 audit(1689222916.404:959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552581 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619181.529368] audit: type=1326 audit(1689222928.728:960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=548478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619204.740432] audit: type=1326 audit(1689222951.940:961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=554938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619231.628546] audit: type=1326 audit(1689222978.828:962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619294.278304] audit: type=1326 audit(1689223041.476:963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619302.932977] audit: type=1326 audit(1689223050.132:964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=553420 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619324.619811] audit: type=1326 audit(1689223071.816:965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619336.253946] audit: type=1326 audit(1689223083.452:966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619398.879385] exe[536155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.939422] exe[516375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.982844] exe[535671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619453.791031] audit: type=1326 audit(1689223200.987:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619465.706772] audit: type=1326 audit(1689223212.903:968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550448 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619487.423938] exe[566400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563c4858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.482399] exe[562461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.528570] exe[563319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619585.499945] audit: type=1326 audit(1689223332.695:969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619596.902218] audit: type=1326 audit(1689223344.099:970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565827 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619607.979102] audit: type=1326 audit(1689223355.175:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619689.631929] audit: type=1326 audit(1689223436.827:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619831.695309] audit: type=1326 audit(1689223578.891:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575570 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619856.886854] audit: type=1326 audit(1689223604.083:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577025 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619974.006322] audit: type=1326 audit(1689223721.203:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579928 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620035.655078] audit: type=1326 audit(1689223782.851:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=581361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620114.896040] audit: type=1326 audit(1689223862.090:977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=547279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620115.147632] audit: type=1326 audit(1689223862.342:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620215.428928] exe[578382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.470748] exe[578378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.508820] exe[545514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620227.851853] audit: type=1326 audit(1689223975.046:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=588747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620256.627986] audit: type=1326 audit(1689224003.822:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=591341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620370.738511] audit: type=1326 audit(1689224117.934:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620399.160346] audit: type=1326 audit(1689224146.354:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596641 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620513.054444] audit: type=1326 audit(1689224260.250:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620514.934894] audit: type=1326 audit(1689224262.130:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=600527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620580.941265] audit: type=1326 audit(1689224328.134:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620643.919662] audit: type=1326 audit(1689224391.114:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620654.467678] audit: type=1326 audit(1689224401.662:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620678.185533] audit: type=1326 audit(1689224425.382:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620753.378385] audit: type=1326 audit(1689224500.574:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606613 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620775.839985] audit: type=1326 audit(1689224523.034:990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620787.380160] audit: type=1326 audit(1689224534.574:991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620878.192117] audit: type=1326 audit(1689224625.385:992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=593770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620910.511245] audit: type=1326 audit(1689224657.705:993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620929.852560] audit: type=1326 audit(1689224677.045:994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=611154 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620952.654833] audit: type=1326 audit(1689224699.849:995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=615888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620975.728228] exe[616067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.809466] exe[616334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.900989] exe[616113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11621052.917706] audit: type=1326 audit(1689224800.113:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614987 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621080.863296] audit: type=1326 audit(1689224828.057:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621086.905149] audit: type=1326 audit(1689224834.097:998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616503 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621093.759891] audit: type=1326 audit(1689224840.953:999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621116.237723] audit: type=1326 audit(1689224863.429:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620684 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621196.426285] audit: type=1326 audit(1689224943.621:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=619071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621228.541993] audit: type=1326 audit(1689224975.737:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621254.426277] audit: type=1326 audit(1689225001.621:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621296.541965] audit: type=1326 audit(1689225043.737:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621338.665441] audit: type=1326 audit(1689225085.857:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=624649 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621388.698603] audit: type=1326 audit(1689225135.893:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=626245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621531.083825] audit: type=1326 audit(1689225278.277:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621601.363569] audit: type=1326 audit(1689225348.560:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=629565 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621641.234574] audit: type=1326 audit(1689225388.432:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621743.423222] audit: type=1326 audit(1689225490.620:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621783.864792] audit: type=1326 audit(1689225531.060:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=638357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621809.898362] audit: type=1326 audit(1689225557.092:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11621826.174675] audit: type=1326 audit(1689225573.372:1013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621885.405910] audit: type=1326 audit(1689225632.600:1014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=645644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621926.533008] audit: type=1326 audit(1689225673.728:1015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621949.459338] audit: type=1326 audit(1689225696.656:1016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662571 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11621949.730129] audit: type=1326 audit(1689225696.924:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662605 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11622002.580862] audit: type=1326 audit(1689225749.776:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622027.131721] audit: type=1326 audit(1689225774.328:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622069.015849] audit: type=1326 audit(1689225816.212:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622089.768391] audit: type=1326 audit(1689225836.964:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=653611 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622168.625168] audit: type=1326 audit(1689225915.820:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622169.672061] audit: type=1326 audit(1689225916.868:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=676306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622191.522526] audit: type=1326 audit(1689225938.716:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682767 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622312.206917] audit: type=1326 audit(1689226059.399:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622325.849714] audit: type=1326 audit(1689226073.043:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=683978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000