D0713 05:18:02.349495 644063 usertrap_amd64.go:122] [ 603: 603] Allocate a new trap: 0xc00057acf0 14 D0713 05:18:02.349509 644063 usertrap_amd64.go:225] [ 603: 603] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:02.349578 644063 task_exit.go:204] [ 603: 603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.349601 644063 task_exit.go:204] [ 603: 603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.349634 644063 task_signals.go:204] [ 603: 606] Signal 603, PID: 606, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.349657 644063 task_signals.go:204] [ 603: 607] Signal 603, PID: 607, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.349664 644063 task_exit.go:204] [ 603: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.349682 644063 task_signals.go:204] [ 603: 604] Signal 603, PID: 604, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.349644 644063 task_signals.go:204] [ 603: 605] Signal 603, PID: 605, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.349693 644063 task_exit.go:204] [ 603: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.349729 644063 task_exit.go:204] [ 603: 606] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.349760 644063 task_exit.go:204] [ 603: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.349796 644063 task_exit.go:204] [ 603: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.349800 644063 task_exit.go:204] [ 603: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.349812 644063 task_exit.go:204] [ 603: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.349868 644063 task_exit.go:204] [ 603: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.349878 644063 task_exit.go:204] [ 603: 604] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.349893 644063 task_exit.go:204] [ 603: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.350986 644063 task_exit.go:204] [ 603: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.351101 644063 task_exit.go:204] [ 603: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.351130 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.351186 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.351210 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.351279 644063 task_exit.go:204] [ 603: 603] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.353330 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.354783 644063 syscalls.go:262] [ 608: 608] Allocating stack with size of 8388608 bytes D0713 05:18:02.354883 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.356470 644063 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.356529 644063 usertrap_amd64.go:106] [ 608: 608] Map a usertrap vma at 63000 D0713 05:18:02.356607 644063 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc0002afec0 1 D0713 05:18:02.356648 644063 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:02.357026 644063 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.357062 644063 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc0002afec0 2 D0713 05:18:02.357076 644063 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:02.357658 644063 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.357742 644063 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc0002afec0 3 D0713 05:18:02.357762 644063 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:02.364208 644063 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.364240 644063 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc0002afec0 4 D0713 05:18:02.364253 644063 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:02.365550 644063 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.365606 644063 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc0002afec0 5 D0713 05:18:02.365624 644063 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:02.365692 644063 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.365701 644063 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc0002afec0 6 D0713 05:18:02.365709 644063 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:02.366084 644063 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.366123 644063 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc0002afec0 7 D0713 05:18:02.366139 644063 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:02.366421 644063 usertrap_amd64.go:212] [ 608: 609] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.366450 644063 usertrap_amd64.go:122] [ 608: 609] Allocate a new trap: 0xc0002afec0 8 D0713 05:18:02.366494 644063 usertrap_amd64.go:225] [ 608: 609] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:02.366764 644063 usertrap_amd64.go:212] [ 608: 609] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.366794 644063 usertrap_amd64.go:122] [ 608: 609] Allocate a new trap: 0xc0002afec0 9 D0713 05:18:02.366807 644063 usertrap_amd64.go:225] [ 608: 609] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:02.366824 644063 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.366835 644063 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc0002afec0 10 D0713 05:18:02.366898 644063 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:02.376004 644063 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.376039 644063 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc0002afec0 11 D0713 05:18:02.376056 644063 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:02.378721 644063 usertrap_amd64.go:212] [ 608: 609] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.378750 644063 usertrap_amd64.go:122] [ 608: 609] Allocate a new trap: 0xc0002afec0 12 D0713 05:18:02.378765 644063 usertrap_amd64.go:225] [ 608: 609] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:02.378796 644063 usertrap_amd64.go:212] [ 608: 609] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.378803 644063 usertrap_amd64.go:122] [ 608: 609] Allocate a new trap: 0xc0002afec0 13 D0713 05:18:02.378811 644063 usertrap_amd64.go:225] [ 608: 609] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:02.378831 644063 task_signals.go:470] [ 608: 608] Notified of signal 23 D0713 05:18:02.378915 644063 task_signals.go:220] [ 608: 608] Signal 23: delivering to handler I0713 05:18:02.387187 644063 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0713 05:18:02.387297 644063 usertrap_amd64.go:212] [ 608: 608] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.387315 644063 usertrap_amd64.go:122] [ 608: 608] Allocate a new trap: 0xc0002afec0 14 D0713 05:18:02.387328 644063 usertrap_amd64.go:225] [ 608: 608] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:02.387366 644063 task_exit.go:204] [ 608: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.387388 644063 task_exit.go:204] [ 608: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.387413 644063 task_signals.go:204] [ 608: 609] Signal 608, PID: 609, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.387465 644063 task_exit.go:204] [ 608: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.387480 644063 task_signals.go:204] [ 608: 611] Signal 608, PID: 611, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.387491 644063 task_exit.go:204] [ 608: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.387498 644063 task_exit.go:204] [ 608: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.387516 644063 task_signals.go:204] [ 608: 613] Signal 608, PID: 613, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.387528 644063 task_exit.go:204] [ 608: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.387547 644063 task_signals.go:204] [ 608: 610] Signal 608, PID: 610, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.387520 644063 task_signals.go:204] [ 608: 612] Signal 608, PID: 612, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.387560 644063 task_exit.go:204] [ 608: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.387602 644063 task_exit.go:204] [ 608: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.387659 644063 task_exit.go:204] [ 608: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.387680 644063 task_exit.go:204] [ 608: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.387699 644063 task_exit.go:204] [ 608: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.387710 644063 task_exit.go:204] [ 608: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.387732 644063 task_exit.go:204] [ 608: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.387738 644063 task_exit.go:204] [ 608: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.387747 644063 task_exit.go:204] [ 608: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.389065 644063 task_exit.go:204] [ 608: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.389103 644063 task_exit.go:204] [ 608: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.389129 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.389160 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.389176 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.389442 644063 task_exit.go:204] [ 608: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.390142 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.391767 644063 syscalls.go:262] [ 614: 614] Allocating stack with size of 8388608 bytes D0713 05:18:02.391891 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.394210 644063 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.394262 644063 usertrap_amd64.go:106] [ 614: 614] Map a usertrap vma at 63000 D0713 05:18:02.394365 644063 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0010be300 1 D0713 05:18:02.394435 644063 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:02.395002 644063 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.395058 644063 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0010be300 2 D0713 05:18:02.395073 644063 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:02.395576 644063 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.395611 644063 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0010be300 3 D0713 05:18:02.395622 644063 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:02.408894 644063 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.409009 644063 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0010be300 4 D0713 05:18:02.409035 644063 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:02.411740 644063 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.411854 644063 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0010be300 5 D0713 05:18:02.411886 644063 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:02.411964 644063 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.411976 644063 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0010be300 6 D0713 05:18:02.411985 644063 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:02.412344 644063 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.412365 644063 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0010be300 7 D0713 05:18:02.412372 644063 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:02.412596 644063 usertrap_amd64.go:212] [ 614: 615] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.412611 644063 usertrap_amd64.go:122] [ 614: 615] Allocate a new trap: 0xc0010be300 8 D0713 05:18:02.412621 644063 usertrap_amd64.go:225] [ 614: 615] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:02.412873 644063 usertrap_amd64.go:212] [ 614: 615] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.412891 644063 usertrap_amd64.go:122] [ 614: 615] Allocate a new trap: 0xc0010be300 9 D0713 05:18:02.412901 644063 usertrap_amd64.go:225] [ 614: 615] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:02.412908 644063 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.412912 644063 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0010be300 10 D0713 05:18:02.412916 644063 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:02.413078 644063 usertrap_amd64.go:212] [ 614: 615] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.413096 644063 usertrap_amd64.go:122] [ 614: 615] Allocate a new trap: 0xc0010be300 11 D0713 05:18:02.413107 644063 usertrap_amd64.go:225] [ 614: 615] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:02.413165 644063 usertrap_amd64.go:212] [ 614: 615] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.413174 644063 usertrap_amd64.go:122] [ 614: 615] Allocate a new trap: 0xc0010be300 12 D0713 05:18:02.413183 644063 usertrap_amd64.go:225] [ 614: 615] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:02.413210 644063 task_signals.go:470] [ 614: 617] Notified of signal 23 D0713 05:18:02.413274 644063 task_signals.go:220] [ 614: 617] Signal 23: delivering to handler D0713 05:18:02.421217 644063 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.421255 644063 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0010be300 13 D0713 05:18:02.421268 644063 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:02.424526 644063 task_signals.go:470] [ 614: 614] Notified of signal 23 D0713 05:18:02.424621 644063 task_signals.go:220] [ 614: 614] Signal 23: delivering to handler I0713 05:18:02.432744 644063 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0713 05:18:02.432871 644063 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.432889 644063 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0010be300 14 D0713 05:18:02.432903 644063 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:02.433066 644063 task_exit.go:204] [ 614: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.433142 644063 task_signals.go:204] [ 614: 618] Signal 614, PID: 618, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.433173 644063 task_signals.go:204] [ 614: 616] Signal 614, PID: 616, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.433193 644063 task_exit.go:204] [ 614: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.433218 644063 task_signals.go:204] [ 614: 617] Signal 614, PID: 617, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.433237 644063 task_signals.go:204] [ 614: 615] Signal 614, PID: 615, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.433254 644063 task_exit.go:204] [ 614: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.433264 644063 task_exit.go:204] [ 614: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.433277 644063 task_exit.go:204] [ 614: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.433291 644063 task_exit.go:204] [ 614: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.433356 644063 task_exit.go:204] [ 614: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.433416 644063 task_exit.go:204] [ 614: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.433454 644063 task_exit.go:204] [ 614: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.433465 644063 task_exit.go:204] [ 614: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.433471 644063 task_exit.go:204] [ 614: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.433483 644063 task_exit.go:204] [ 614: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.434738 644063 task_exit.go:204] [ 614: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.434838 644063 task_exit.go:204] [ 614: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.434902 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.435006 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.435044 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.435106 644063 task_exit.go:204] [ 614: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.435772 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.437151 644063 syscalls.go:262] [ 619: 619] Allocating stack with size of 8388608 bytes D0713 05:18:02.437334 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.438161 644063 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.438204 644063 usertrap_amd64.go:106] [ 619: 619] Map a usertrap vma at 63000 D0713 05:18:02.438277 644063 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc000c03aa0 1 D0713 05:18:02.438303 644063 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:02.438706 644063 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.438736 644063 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc000c03aa0 2 D0713 05:18:02.438750 644063 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:02.439440 644063 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.439502 644063 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc000c03aa0 3 D0713 05:18:02.439523 644063 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:02.446648 644063 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.446691 644063 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc000c03aa0 4 D0713 05:18:02.446709 644063 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:02.447781 644063 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.447814 644063 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc000c03aa0 5 D0713 05:18:02.447827 644063 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:02.447866 644063 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.447873 644063 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc000c03aa0 6 D0713 05:18:02.447880 644063 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:02.448041 644063 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.448064 644063 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc000c03aa0 7 D0713 05:18:02.448071 644063 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:02.448394 644063 usertrap_amd64.go:212] [ 619: 620] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.448436 644063 usertrap_amd64.go:122] [ 619: 620] Allocate a new trap: 0xc000c03aa0 8 D0713 05:18:02.448450 644063 usertrap_amd64.go:225] [ 619: 620] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:02.448879 644063 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.448911 644063 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc000c03aa0 9 D0713 05:18:02.448927 644063 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:02.448967 644063 usertrap_amd64.go:212] [ 619: 620] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.448977 644063 usertrap_amd64.go:122] [ 619: 620] Allocate a new trap: 0xc000c03aa0 10 D0713 05:18:02.448987 644063 usertrap_amd64.go:225] [ 619: 620] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:02.458977 644063 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.459030 644063 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc000c03aa0 11 D0713 05:18:02.459045 644063 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:02.460413 644063 usertrap_amd64.go:212] [ 619: 620] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.460460 644063 usertrap_amd64.go:122] [ 619: 620] Allocate a new trap: 0xc000c03aa0 12 D0713 05:18:02.462057 644063 usertrap_amd64.go:225] [ 619: 620] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:02.462200 644063 usertrap_amd64.go:212] [ 619: 620] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.462216 644063 usertrap_amd64.go:122] [ 619: 620] Allocate a new trap: 0xc000c03aa0 13 D0713 05:18:02.462262 644063 usertrap_amd64.go:225] [ 619: 620] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:02.462324 644063 task_signals.go:470] [ 619: 619] Notified of signal 23 D0713 05:18:02.462670 644063 task_signals.go:220] [ 619: 619] Signal 23: delivering to handler I0713 05:18:02.469961 644063 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0713 05:18:02.470056 644063 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.470069 644063 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc000c03aa0 14 D0713 05:18:02.470080 644063 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:02.470150 644063 task_exit.go:204] [ 619: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.470177 644063 task_exit.go:204] [ 619: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.470207 644063 task_signals.go:204] [ 619: 622] Signal 619, PID: 622, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.470238 644063 task_exit.go:204] [ 619: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.470217 644063 task_signals.go:204] [ 619: 621] Signal 619, PID: 621, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.470250 644063 task_exit.go:204] [ 619: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.470266 644063 task_exit.go:204] [ 619: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.470322 644063 task_signals.go:204] [ 619: 620] Signal 619, PID: 620, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.470343 644063 task_exit.go:204] [ 619: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.470351 644063 task_signals.go:204] [ 619: 623] Signal 619, PID: 623, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.470364 644063 task_exit.go:204] [ 619: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.470369 644063 task_exit.go:204] [ 619: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.470375 644063 task_exit.go:204] [ 619: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.470379 644063 task_exit.go:204] [ 619: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.470383 644063 task_exit.go:204] [ 619: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.470390 644063 task_exit.go:204] [ 619: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.471748 644063 task_exit.go:204] [ 619: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.471779 644063 task_exit.go:204] [ 619: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.471802 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.471871 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.471918 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.471956 644063 task_exit.go:204] [ 619: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.472490 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.474294 644063 syscalls.go:262] [ 624: 624] Allocating stack with size of 8388608 bytes D0713 05:18:02.474482 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.477206 644063 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.477263 644063 usertrap_amd64.go:106] [ 624: 624] Map a usertrap vma at 60000 D0713 05:18:02.477360 644063 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc0010be750 1 D0713 05:18:02.477396 644063 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:02.477633 644063 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.477656 644063 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc0010be750 2 D0713 05:18:02.477666 644063 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:02.478248 644063 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.478285 644063 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc0010be750 3 D0713 05:18:02.478303 644063 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:02.486094 644063 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.486143 644063 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc0010be750 4 D0713 05:18:02.486161 644063 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:02.487439 644063 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.487487 644063 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc0010be750 5 D0713 05:18:02.487504 644063 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:02.487573 644063 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.487607 644063 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc0010be750 6 D0713 05:18:02.487621 644063 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:02.488061 644063 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.488091 644063 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc0010be750 7 D0713 05:18:02.488103 644063 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:02.488323 644063 usertrap_amd64.go:212] [ 624: 625] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.488359 644063 usertrap_amd64.go:122] [ 624: 625] Allocate a new trap: 0xc0010be750 8 D0713 05:18:02.488402 644063 usertrap_amd64.go:225] [ 624: 625] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:02.488882 644063 usertrap_amd64.go:212] [ 624: 625] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.488910 644063 usertrap_amd64.go:122] [ 624: 625] Allocate a new trap: 0xc0010be750 9 D0713 05:18:02.488923 644063 usertrap_amd64.go:225] [ 624: 625] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:02.488936 644063 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.489016 644063 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc0010be750 10 D0713 05:18:02.489027 644063 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:02.489620 644063 usertrap_amd64.go:212] [ 624: 625] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.489650 644063 usertrap_amd64.go:122] [ 624: 625] Allocate a new trap: 0xc0010be750 11 D0713 05:18:02.489669 644063 usertrap_amd64.go:225] [ 624: 625] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:02.489938 644063 usertrap_amd64.go:212] [ 624: 625] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.489972 644063 usertrap_amd64.go:122] [ 624: 625] Allocate a new trap: 0xc0010be750 12 D0713 05:18:02.489983 644063 usertrap_amd64.go:225] [ 624: 625] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:02.490008 644063 task_signals.go:470] [ 624: 624] Notified of signal 23 D0713 05:18:02.490031 644063 task_signals.go:220] [ 624: 624] Signal 23: delivering to handler D0713 05:18:02.497300 644063 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.497344 644063 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc0010be750 13 D0713 05:18:02.497360 644063 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:02.500178 644063 task_signals.go:470] [ 624: 624] Notified of signal 23 D0713 05:18:02.500237 644063 task_signals.go:220] [ 624: 624] Signal 23: delivering to handler I0713 05:18:02.508412 644063 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0713 05:18:02.508511 644063 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.508524 644063 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc0010be750 14 D0713 05:18:02.508536 644063 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:02.508662 644063 task_exit.go:204] [ 624: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.508693 644063 task_exit.go:204] [ 624: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.508718 644063 task_signals.go:204] [ 624: 627] Signal 624, PID: 627, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.508726 644063 task_signals.go:204] [ 624: 625] Signal 624, PID: 625, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.508717 644063 task_signals.go:204] [ 624: 626] Signal 624, PID: 626, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.508744 644063 task_exit.go:204] [ 624: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.508782 644063 task_exit.go:204] [ 624: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.508814 644063 task_exit.go:204] [ 624: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.508880 644063 task_signals.go:204] [ 624: 628] Signal 624, PID: 628, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.508888 644063 task_exit.go:204] [ 624: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.508914 644063 task_exit.go:204] [ 624: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.508923 644063 task_exit.go:204] [ 624: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.508982 644063 task_exit.go:204] [ 624: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.508997 644063 task_exit.go:204] [ 624: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.509007 644063 task_exit.go:204] [ 624: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.509021 644063 task_exit.go:204] [ 624: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.510547 644063 task_exit.go:204] [ 624: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.510586 644063 task_exit.go:204] [ 624: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.510601 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.510650 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.510659 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.510760 644063 task_exit.go:204] [ 624: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.511747 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.513142 644063 syscalls.go:262] [ 629: 629] Allocating stack with size of 8388608 bytes D0713 05:18:02.513388 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.517970 644063 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.518017 644063 usertrap_amd64.go:106] [ 629: 629] Map a usertrap vma at 60000 D0713 05:18:02.518181 644063 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0010be7e0 1 D0713 05:18:02.518223 644063 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:02.518722 644063 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.518791 644063 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0010be7e0 2 D0713 05:18:02.518810 644063 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:02.519718 644063 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.519794 644063 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0010be7e0 3 D0713 05:18:02.519894 644063 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:02.525930 644063 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.525967 644063 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0010be7e0 4 D0713 05:18:02.525984 644063 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:02.527056 644063 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.527082 644063 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0010be7e0 5 D0713 05:18:02.527097 644063 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:02.527147 644063 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.527155 644063 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0010be7e0 6 D0713 05:18:02.527165 644063 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:02.527343 644063 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.527364 644063 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0010be7e0 7 D0713 05:18:02.527372 644063 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:02.527530 644063 usertrap_amd64.go:212] [ 629: 630] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.527557 644063 usertrap_amd64.go:122] [ 629: 630] Allocate a new trap: 0xc0010be7e0 8 D0713 05:18:02.527570 644063 usertrap_amd64.go:225] [ 629: 630] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:02.528313 644063 usertrap_amd64.go:212] [ 629: 630] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.528341 644063 usertrap_amd64.go:122] [ 629: 630] Allocate a new trap: 0xc0010be7e0 9 D0713 05:18:02.528352 644063 usertrap_amd64.go:225] [ 629: 630] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:02.528430 644063 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.528440 644063 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0010be7e0 10 D0713 05:18:02.528449 644063 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:02.535720 644063 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.535758 644063 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0010be7e0 11 D0713 05:18:02.535775 644063 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:02.538746 644063 usertrap_amd64.go:212] [ 629: 630] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.538782 644063 usertrap_amd64.go:122] [ 629: 630] Allocate a new trap: 0xc0010be7e0 12 D0713 05:18:02.538798 644063 usertrap_amd64.go:225] [ 629: 630] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:02.538966 644063 usertrap_amd64.go:212] [ 629: 630] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.539720 644063 usertrap_amd64.go:122] [ 629: 630] Allocate a new trap: 0xc0010be7e0 13 D0713 05:18:02.539746 644063 usertrap_amd64.go:225] [ 629: 630] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:02.539848 644063 task_signals.go:470] [ 629: 629] Notified of signal 23 D0713 05:18:02.539918 644063 task_signals.go:220] [ 629: 629] Signal 23: delivering to handler I0713 05:18:02.546450 644063 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0713 05:18:02.546537 644063 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.546551 644063 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc0010be7e0 14 D0713 05:18:02.546564 644063 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:02.546608 644063 task_exit.go:204] [ 629: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.546635 644063 task_exit.go:204] [ 629: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.546661 644063 task_signals.go:204] [ 629: 630] Signal 629, PID: 630, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.546686 644063 task_exit.go:204] [ 629: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.546698 644063 task_exit.go:204] [ 629: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.546703 644063 task_exit.go:204] [ 629: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.546721 644063 task_signals.go:204] [ 629: 631] Signal 629, PID: 631, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.546732 644063 task_exit.go:204] [ 629: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.546739 644063 task_exit.go:204] [ 629: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.546758 644063 task_exit.go:204] [ 629: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.546774 644063 task_signals.go:204] [ 629: 632] Signal 629, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.546784 644063 task_exit.go:204] [ 629: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.546797 644063 task_exit.go:204] [ 629: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.546804 644063 task_exit.go:204] [ 629: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.546820 644063 task_signals.go:204] [ 629: 633] Signal 629, PID: 633, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.546839 644063 task_exit.go:204] [ 629: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.548109 644063 task_exit.go:204] [ 629: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.548148 644063 task_exit.go:204] [ 629: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.548163 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.548195 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.548205 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.548279 644063 task_exit.go:204] [ 629: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.548823 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.550105 644063 syscalls.go:262] [ 634: 634] Allocating stack with size of 8388608 bytes D0713 05:18:02.550182 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.551387 644063 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.551424 644063 usertrap_amd64.go:106] [ 634: 634] Map a usertrap vma at 66000 D0713 05:18:02.551485 644063 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc00057bc50 1 D0713 05:18:02.551514 644063 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:02.551876 644063 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.551950 644063 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc00057bc50 2 D0713 05:18:02.551990 644063 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:02.553251 644063 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.553301 644063 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc00057bc50 3 D0713 05:18:02.553320 644063 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:02.559645 644063 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.559687 644063 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc00057bc50 4 D0713 05:18:02.559702 644063 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:02.560726 644063 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.560772 644063 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc00057bc50 5 D0713 05:18:02.560789 644063 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:02.560832 644063 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.560840 644063 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc00057bc50 6 D0713 05:18:02.560847 644063 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:02.561052 644063 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.561081 644063 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc00057bc50 7 D0713 05:18:02.561090 644063 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:02.562304 644063 usertrap_amd64.go:212] [ 634: 635] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.562346 644063 usertrap_amd64.go:122] [ 634: 635] Allocate a new trap: 0xc00057bc50 8 D0713 05:18:02.562359 644063 usertrap_amd64.go:225] [ 634: 635] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:02.562605 644063 usertrap_amd64.go:212] [ 634: 635] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.562637 644063 usertrap_amd64.go:122] [ 634: 635] Allocate a new trap: 0xc00057bc50 9 D0713 05:18:02.562652 644063 usertrap_amd64.go:225] [ 634: 635] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:02.562932 644063 usertrap_amd64.go:212] [ 634: 636] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.562969 644063 usertrap_amd64.go:122] [ 634: 636] Allocate a new trap: 0xc00057bc50 10 D0713 05:18:02.562981 644063 usertrap_amd64.go:225] [ 634: 636] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:02.563472 644063 usertrap_amd64.go:212] [ 634: 635] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.563505 644063 usertrap_amd64.go:122] [ 634: 635] Allocate a new trap: 0xc00057bc50 11 D0713 05:18:02.563515 644063 usertrap_amd64.go:225] [ 634: 635] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:02.563556 644063 usertrap_amd64.go:212] [ 634: 635] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.563576 644063 usertrap_amd64.go:122] [ 634: 635] Allocate a new trap: 0xc00057bc50 12 D0713 05:18:02.563587 644063 usertrap_amd64.go:225] [ 634: 635] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:02.563603 644063 task_signals.go:470] [ 634: 634] Notified of signal 23 D0713 05:18:02.563631 644063 task_signals.go:179] [ 634: 634] Restarting syscall 202: interrupted by signal 23 D0713 05:18:02.563661 644063 task_signals.go:220] [ 634: 634] Signal 23: delivering to handler D0713 05:18:02.571265 644063 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.571311 644063 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc00057bc50 13 D0713 05:18:02.571325 644063 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:02.574628 644063 task_signals.go:470] [ 634: 634] Notified of signal 23 D0713 05:18:02.574749 644063 task_signals.go:220] [ 634: 634] Signal 23: delivering to handler I0713 05:18:02.582216 644063 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0713 05:18:02.582308 644063 usertrap_amd64.go:212] [ 634: 634] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.582320 644063 usertrap_amd64.go:122] [ 634: 634] Allocate a new trap: 0xc00057bc50 14 D0713 05:18:02.582331 644063 usertrap_amd64.go:225] [ 634: 634] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:02.582380 644063 task_exit.go:204] [ 634: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.582414 644063 task_exit.go:204] [ 634: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.582443 644063 task_signals.go:204] [ 634: 637] Signal 634, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.582539 644063 task_exit.go:204] [ 634: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.582553 644063 task_exit.go:204] [ 634: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.582559 644063 task_exit.go:204] [ 634: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.582456 644063 task_signals.go:204] [ 634: 635] Signal 634, PID: 635, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.582575 644063 task_exit.go:204] [ 634: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.582583 644063 task_exit.go:204] [ 634: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.582588 644063 task_exit.go:204] [ 634: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.582437 644063 task_signals.go:204] [ 634: 636] Signal 634, PID: 636, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.582599 644063 task_exit.go:204] [ 634: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.582609 644063 task_exit.go:204] [ 634: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.582614 644063 task_exit.go:204] [ 634: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.582473 644063 task_signals.go:204] [ 634: 638] Signal 634, PID: 638, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.582630 644063 task_exit.go:204] [ 634: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.583866 644063 task_exit.go:204] [ 634: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.583904 644063 task_exit.go:204] [ 634: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.583917 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.583969 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.584019 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.584044 644063 task_exit.go:204] [ 634: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.584520 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.586127 644063 syscalls.go:262] [ 639: 639] Allocating stack with size of 8388608 bytes D0713 05:18:02.586246 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.588223 644063 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.588260 644063 usertrap_amd64.go:106] [ 639: 639] Map a usertrap vma at 69000 D0713 05:18:02.588378 644063 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0012b64b0 1 D0713 05:18:02.588414 644063 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:02.588826 644063 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.588852 644063 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0012b64b0 2 D0713 05:18:02.588871 644063 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:02.589491 644063 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.589516 644063 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0012b64b0 3 D0713 05:18:02.589527 644063 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:02.595995 644063 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.596051 644063 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0012b64b0 4 D0713 05:18:02.596070 644063 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:02.597402 644063 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.597438 644063 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0012b64b0 5 D0713 05:18:02.597455 644063 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:02.597510 644063 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.597524 644063 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0012b64b0 6 D0713 05:18:02.597533 644063 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:02.598097 644063 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.598138 644063 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0012b64b0 7 D0713 05:18:02.598153 644063 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:02.598364 644063 usertrap_amd64.go:212] [ 639: 640] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.598405 644063 usertrap_amd64.go:122] [ 639: 640] Allocate a new trap: 0xc0012b64b0 8 D0713 05:18:02.598423 644063 usertrap_amd64.go:225] [ 639: 640] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:02.598679 644063 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.598743 644063 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0012b64b0 9 D0713 05:18:02.598780 644063 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:02.598826 644063 usertrap_amd64.go:212] [ 639: 640] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.598835 644063 usertrap_amd64.go:122] [ 639: 640] Allocate a new trap: 0xc0012b64b0 10 D0713 05:18:02.598843 644063 usertrap_amd64.go:225] [ 639: 640] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:02.607373 644063 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.607411 644063 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0012b64b0 11 D0713 05:18:02.607426 644063 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:02.610843 644063 usertrap_amd64.go:212] [ 639: 640] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.610883 644063 usertrap_amd64.go:122] [ 639: 640] Allocate a new trap: 0xc0012b64b0 12 D0713 05:18:02.610897 644063 usertrap_amd64.go:225] [ 639: 640] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:02.611098 644063 usertrap_amd64.go:212] [ 639: 640] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.611121 644063 usertrap_amd64.go:122] [ 639: 640] Allocate a new trap: 0xc0012b64b0 13 D0713 05:18:02.611141 644063 usertrap_amd64.go:225] [ 639: 640] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:02.611186 644063 task_signals.go:470] [ 639: 639] Notified of signal 23 D0713 05:18:02.611306 644063 task_signals.go:220] [ 639: 639] Signal 23: delivering to handler D0713 05:18:02.619758 644063 usertrap_amd64.go:212] [ 639: 639] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.619827 644063 usertrap_amd64.go:122] [ 639: 639] Allocate a new trap: 0xc0012b64b0 14 D0713 05:18:02.619858 644063 usertrap_amd64.go:225] [ 639: 639] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:02.620716 644063 task_exit.go:204] [ 639: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.620892 644063 task_exit.go:204] [ 639: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.621030 644063 task_signals.go:204] [ 639: 640] Signal 639, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.621088 644063 task_exit.go:204] [ 639: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.621116 644063 task_exit.go:204] [ 639: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.621149 644063 task_exit.go:204] [ 639: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.621198 644063 task_signals.go:204] [ 639: 641] Signal 639, PID: 641, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.621215 644063 task_exit.go:204] [ 639: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.621224 644063 task_signals.go:204] [ 639: 643] Signal 639, PID: 643, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.621210 644063 task_signals.go:204] [ 639: 642] Signal 639, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.621255 644063 task_exit.go:204] [ 639: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.621278 644063 task_exit.go:204] [ 639: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.621299 644063 task_exit.go:204] [ 639: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.621324 644063 task_exit.go:204] [ 639: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.621330 644063 task_exit.go:204] [ 639: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.621342 644063 task_exit.go:204] [ 639: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.622671 644063 task_exit.go:204] [ 639: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.622717 644063 task_exit.go:204] [ 639: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.622739 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.622770 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.622832 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.623050 644063 task_exit.go:204] [ 639: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.623888 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.625691 644063 syscalls.go:262] [ 644: 644] Allocating stack with size of 8388608 bytes D0713 05:18:02.625945 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.627422 644063 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.627459 644063 usertrap_amd64.go:106] [ 644: 644] Map a usertrap vma at 66000 D0713 05:18:02.627637 644063 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc00169c630 1 D0713 05:18:02.627667 644063 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:02.628382 644063 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.628415 644063 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc00169c630 2 D0713 05:18:02.628427 644063 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:02.629264 644063 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.629293 644063 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc00169c630 3 D0713 05:18:02.629308 644063 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:02.636253 644063 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.636294 644063 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc00169c630 4 D0713 05:18:02.636308 644063 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:02.639725 644063 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.639761 644063 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc00169c630 5 D0713 05:18:02.639773 644063 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:02.639824 644063 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.639833 644063 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc00169c630 6 D0713 05:18:02.639842 644063 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:02.640144 644063 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.640172 644063 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc00169c630 7 D0713 05:18:02.640181 644063 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:02.640383 644063 usertrap_amd64.go:212] [ 644: 645] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.640408 644063 usertrap_amd64.go:122] [ 644: 645] Allocate a new trap: 0xc00169c630 8 D0713 05:18:02.640418 644063 usertrap_amd64.go:225] [ 644: 645] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:02.640755 644063 usertrap_amd64.go:212] [ 644: 645] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.640825 644063 usertrap_amd64.go:122] [ 644: 645] Allocate a new trap: 0xc00169c630 9 D0713 05:18:02.640845 644063 usertrap_amd64.go:225] [ 644: 645] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:02.640909 644063 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.640929 644063 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc00169c630 10 D0713 05:18:02.640935 644063 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:02.649939 644063 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.650047 644063 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc00169c630 11 D0713 05:18:02.650077 644063 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:02.652671 644063 usertrap_amd64.go:212] [ 644: 645] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.652707 644063 usertrap_amd64.go:122] [ 644: 645] Allocate a new trap: 0xc00169c630 12 D0713 05:18:02.652722 644063 usertrap_amd64.go:225] [ 644: 645] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:02.652802 644063 usertrap_amd64.go:212] [ 644: 645] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.652865 644063 usertrap_amd64.go:122] [ 644: 645] Allocate a new trap: 0xc00169c630 13 D0713 05:18:02.652885 644063 usertrap_amd64.go:225] [ 644: 645] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:02.652974 644063 task_signals.go:470] [ 644: 644] Notified of signal 23 D0713 05:18:02.653053 644063 task_signals.go:220] [ 644: 644] Signal 23: delivering to handler I0713 05:18:02.659934 644063 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0713 05:18:02.660041 644063 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.660067 644063 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc00169c630 14 D0713 05:18:02.660081 644063 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:02.660112 644063 task_exit.go:204] [ 644: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.660147 644063 task_exit.go:204] [ 644: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.660167 644063 task_signals.go:204] [ 644: 646] Signal 644, PID: 646, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.660199 644063 task_signals.go:204] [ 644: 647] Signal 644, PID: 647, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.660199 644063 task_exit.go:204] [ 644: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.660168 644063 task_signals.go:204] [ 644: 648] Signal 644, PID: 648, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.660187 644063 task_signals.go:204] [ 644: 645] Signal 644, PID: 645, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.660222 644063 task_exit.go:204] [ 644: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.660230 644063 task_exit.go:204] [ 644: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.660245 644063 task_exit.go:204] [ 644: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.660254 644063 task_exit.go:204] [ 644: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.660260 644063 task_exit.go:204] [ 644: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.660268 644063 task_exit.go:204] [ 644: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.660273 644063 task_exit.go:204] [ 644: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.660276 644063 task_exit.go:204] [ 644: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.660291 644063 task_exit.go:204] [ 644: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.661533 644063 task_exit.go:204] [ 644: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.661565 644063 task_exit.go:204] [ 644: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.661585 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.661614 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.661624 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.661862 644063 task_exit.go:204] [ 644: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.665313 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.667028 644063 syscalls.go:262] [ 649: 649] Allocating stack with size of 8388608 bytes D0713 05:18:02.667171 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.677883 644063 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.677951 644063 usertrap_amd64.go:106] [ 649: 649] Map a usertrap vma at 68000 D0713 05:18:02.678033 644063 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010bed20 1 D0713 05:18:02.678064 644063 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:02.680161 644063 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.680183 644063 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010bed20 2 D0713 05:18:02.680191 644063 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:02.680865 644063 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.680888 644063 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010bed20 3 D0713 05:18:02.680895 644063 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:02.688897 644063 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.688933 644063 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010bed20 4 D0713 05:18:02.688979 644063 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:02.690292 644063 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.690327 644063 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010bed20 5 D0713 05:18:02.690341 644063 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:02.690403 644063 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.690421 644063 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010bed20 6 D0713 05:18:02.690427 644063 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:02.690681 644063 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.690696 644063 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010bed20 7 D0713 05:18:02.690702 644063 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:02.690850 644063 usertrap_amd64.go:212] [ 649: 650] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.690894 644063 usertrap_amd64.go:122] [ 649: 650] Allocate a new trap: 0xc0010bed20 8 D0713 05:18:02.690910 644063 usertrap_amd64.go:225] [ 649: 650] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:02.691110 644063 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.691125 644063 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010bed20 9 D0713 05:18:02.691135 644063 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:02.691171 644063 usertrap_amd64.go:212] [ 649: 650] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.691178 644063 usertrap_amd64.go:122] [ 649: 650] Allocate a new trap: 0xc0010bed20 10 D0713 05:18:02.691186 644063 usertrap_amd64.go:225] [ 649: 650] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:02.698716 644063 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.698751 644063 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010bed20 11 D0713 05:18:02.698763 644063 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:02.701733 644063 usertrap_amd64.go:212] [ 649: 650] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.701785 644063 usertrap_amd64.go:122] [ 649: 650] Allocate a new trap: 0xc0010bed20 12 D0713 05:18:02.701802 644063 usertrap_amd64.go:225] [ 649: 650] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:02.701874 644063 usertrap_amd64.go:212] [ 649: 650] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.701895 644063 usertrap_amd64.go:122] [ 649: 650] Allocate a new trap: 0xc0010bed20 13 D0713 05:18:02.701909 644063 usertrap_amd64.go:225] [ 649: 650] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:02.701949 644063 task_signals.go:470] [ 649: 649] Notified of signal 23 D0713 05:18:02.702059 644063 task_signals.go:220] [ 649: 649] Signal 23: delivering to handler I0713 05:18:02.708863 644063 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0713 05:18:02.708926 644063 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.708978 644063 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010bed20 14 D0713 05:18:02.708994 644063 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:02.709069 644063 task_exit.go:204] [ 649: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.709174 644063 task_exit.go:204] [ 649: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.709214 644063 task_signals.go:204] [ 649: 652] Signal 649, PID: 652, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.709255 644063 task_exit.go:204] [ 649: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.709259 644063 task_signals.go:204] [ 649: 651] Signal 649, PID: 651, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.709273 644063 task_exit.go:204] [ 649: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.709280 644063 task_exit.go:204] [ 649: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.709301 644063 task_signals.go:204] [ 649: 653] Signal 649, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.709319 644063 task_exit.go:204] [ 649: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.709327 644063 task_exit.go:204] [ 649: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.709320 644063 task_signals.go:204] [ 649: 650] Signal 649, PID: 650, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.709334 644063 task_exit.go:204] [ 649: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.709361 644063 task_exit.go:204] [ 649: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.709380 644063 task_exit.go:204] [ 649: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.709390 644063 task_exit.go:204] [ 649: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.709398 644063 task_exit.go:204] [ 649: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.710714 644063 task_exit.go:204] [ 649: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.710751 644063 task_exit.go:204] [ 649: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.710770 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.710796 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.710805 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.710894 644063 task_exit.go:204] [ 649: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.711611 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.713117 644063 syscalls.go:262] [ 654: 654] Allocating stack with size of 8388608 bytes D0713 05:18:02.713228 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.714303 644063 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.714344 644063 usertrap_amd64.go:106] [ 654: 654] Map a usertrap vma at 6a000 D0713 05:18:02.714823 644063 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0012b6a20 1 D0713 05:18:02.714865 644063 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:02.715205 644063 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.715235 644063 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0012b6a20 2 D0713 05:18:02.715245 644063 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:02.715842 644063 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.715866 644063 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0012b6a20 3 D0713 05:18:02.715877 644063 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:02.727457 644063 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.727516 644063 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0012b6a20 4 D0713 05:18:02.727534 644063 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:02.728846 644063 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.728869 644063 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0012b6a20 5 D0713 05:18:02.728882 644063 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:02.728974 644063 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.728993 644063 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0012b6a20 6 D0713 05:18:02.729002 644063 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:02.729434 644063 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.729451 644063 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0012b6a20 7 D0713 05:18:02.729461 644063 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:02.729601 644063 usertrap_amd64.go:212] [ 654: 655] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.729623 644063 usertrap_amd64.go:122] [ 654: 655] Allocate a new trap: 0xc0012b6a20 8 D0713 05:18:02.729633 644063 usertrap_amd64.go:225] [ 654: 655] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:02.729767 644063 usertrap_amd64.go:212] [ 654: 655] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.729785 644063 usertrap_amd64.go:122] [ 654: 655] Allocate a new trap: 0xc0012b6a20 9 D0713 05:18:02.729792 644063 usertrap_amd64.go:225] [ 654: 655] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:02.729856 644063 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.729872 644063 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0012b6a20 10 D0713 05:18:02.729880 644063 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:02.737609 644063 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.737630 644063 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0012b6a20 11 D0713 05:18:02.737645 644063 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:02.741112 644063 usertrap_amd64.go:212] [ 654: 655] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.741138 644063 usertrap_amd64.go:122] [ 654: 655] Allocate a new trap: 0xc0012b6a20 12 D0713 05:18:02.741154 644063 usertrap_amd64.go:225] [ 654: 655] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:02.741240 644063 usertrap_amd64.go:212] [ 654: 655] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.741269 644063 usertrap_amd64.go:122] [ 654: 655] Allocate a new trap: 0xc0012b6a20 13 D0713 05:18:02.741282 644063 usertrap_amd64.go:225] [ 654: 655] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:02.741343 644063 task_signals.go:470] [ 654: 654] Notified of signal 23 D0713 05:18:02.741448 644063 task_signals.go:220] [ 654: 654] Signal 23: delivering to handler I0713 05:18:02.747305 644063 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0713 05:18:02.747485 644063 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.747573 644063 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0012b6a20 14 D0713 05:18:02.747667 644063 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:02.747858 644063 task_exit.go:204] [ 654: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.747905 644063 task_exit.go:204] [ 654: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.747956 644063 task_signals.go:204] [ 654: 656] Signal 654, PID: 656, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.747999 644063 task_exit.go:204] [ 654: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.748027 644063 task_exit.go:204] [ 654: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.748050 644063 task_exit.go:204] [ 654: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.748113 644063 task_signals.go:204] [ 654: 657] Signal 654, PID: 657, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.748165 644063 task_exit.go:204] [ 654: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.748248 644063 task_exit.go:204] [ 654: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.748298 644063 task_exit.go:204] [ 654: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.748120 644063 task_signals.go:204] [ 654: 658] Signal 654, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.748371 644063 task_exit.go:204] [ 654: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.748382 644063 task_exit.go:204] [ 654: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.748388 644063 task_exit.go:204] [ 654: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.748402 644063 task_signals.go:204] [ 654: 655] Signal 654, PID: 655, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.748413 644063 task_exit.go:204] [ 654: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.749767 644063 task_exit.go:204] [ 654: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.749803 644063 task_exit.go:204] [ 654: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.749824 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.749914 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.749926 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.750115 644063 task_exit.go:204] [ 654: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.750942 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.752456 644063 syscalls.go:262] [ 659: 659] Allocating stack with size of 8388608 bytes D0713 05:18:02.752679 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.754614 644063 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.754690 644063 usertrap_amd64.go:106] [ 659: 659] Map a usertrap vma at 64000 D0713 05:18:02.754780 644063 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc00169d050 1 D0713 05:18:02.754816 644063 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:02.755314 644063 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.755338 644063 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc00169d050 2 D0713 05:18:02.755349 644063 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:02.755992 644063 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.756022 644063 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc00169d050 3 D0713 05:18:02.756035 644063 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:02.762919 644063 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.762960 644063 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc00169d050 4 D0713 05:18:02.762974 644063 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:02.764462 644063 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.764518 644063 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc00169d050 5 D0713 05:18:02.764539 644063 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:02.764597 644063 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.764605 644063 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc00169d050 6 D0713 05:18:02.764615 644063 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:02.765087 644063 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.765113 644063 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc00169d050 7 D0713 05:18:02.765134 644063 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:02.765347 644063 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.765372 644063 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc00169d050 8 D0713 05:18:02.765382 644063 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:02.765683 644063 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.765707 644063 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc00169d050 9 D0713 05:18:02.765716 644063 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:02.765796 644063 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.765811 644063 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc00169d050 10 D0713 05:18:02.765818 644063 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:02.773923 644063 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.773964 644063 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc00169d050 11 D0713 05:18:02.773979 644063 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:02.776615 644063 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.776652 644063 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc00169d050 12 D0713 05:18:02.776670 644063 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:02.776715 644063 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.776726 644063 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc00169d050 13 D0713 05:18:02.776737 644063 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:02.777024 644063 task_signals.go:470] [ 659: 659] Notified of signal 23 D0713 05:18:02.777193 644063 task_signals.go:220] [ 659: 659] Signal 23: delivering to handler D0713 05:18:02.784728 644063 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.784761 644063 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc00169d050 14 D0713 05:18:02.784778 644063 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:02.784866 644063 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.784910 644063 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.784999 644063 task_signals.go:204] [ 659: 661] Signal 659, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.785029 644063 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.785020 644063 task_signals.go:204] [ 659: 660] Signal 659, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.785039 644063 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.785056 644063 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.785153 644063 task_signals.go:204] [ 659: 662] Signal 659, PID: 662, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.785180 644063 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.785188 644063 task_signals.go:204] [ 659: 663] Signal 659, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.785196 644063 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.785268 644063 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.785285 644063 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.785294 644063 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.785300 644063 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.785310 644063 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.786568 644063 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.786591 644063 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.786609 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.787710 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.787735 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.787904 644063 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.788987 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.790341 644063 syscalls.go:262] [ 664: 664] Allocating stack with size of 8388608 bytes D0713 05:18:02.790494 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.791523 644063 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.791567 644063 usertrap_amd64.go:106] [ 664: 664] Map a usertrap vma at 65000 D0713 05:18:02.791663 644063 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc0005c7e60 1 D0713 05:18:02.791696 644063 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:02.792141 644063 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.792182 644063 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc0005c7e60 2 D0713 05:18:02.792195 644063 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:02.792640 644063 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.792672 644063 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc0005c7e60 3 D0713 05:18:02.792717 644063 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:02.798526 644063 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.798558 644063 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc0005c7e60 4 D0713 05:18:02.798573 644063 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:02.799891 644063 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.799995 644063 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc0005c7e60 5 D0713 05:18:02.800051 644063 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:02.800185 644063 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.800278 644063 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc0005c7e60 6 D0713 05:18:02.800355 644063 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:02.801014 644063 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.801050 644063 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc0005c7e60 7 D0713 05:18:02.801060 644063 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:02.801208 644063 usertrap_amd64.go:212] [ 664: 665] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.801230 644063 usertrap_amd64.go:122] [ 664: 665] Allocate a new trap: 0xc0005c7e60 8 D0713 05:18:02.801243 644063 usertrap_amd64.go:225] [ 664: 665] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:02.801473 644063 usertrap_amd64.go:212] [ 664: 665] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.801490 644063 usertrap_amd64.go:122] [ 664: 665] Allocate a new trap: 0xc0005c7e60 9 D0713 05:18:02.801502 644063 usertrap_amd64.go:225] [ 664: 665] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:02.801534 644063 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.801543 644063 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc0005c7e60 10 D0713 05:18:02.801552 644063 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:02.801754 644063 usertrap_amd64.go:212] [ 664: 667] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:02.801768 644063 usertrap_amd64.go:122] [ 664: 667] Allocate a new trap: 0xc0005c7e60 11 D0713 05:18:02.801777 644063 usertrap_amd64.go:225] [ 664: 667] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:02.808849 644063 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.808879 644063 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc0005c7e60 12 D0713 05:18:02.808890 644063 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:02.811976 644063 usertrap_amd64.go:212] [ 664: 665] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.812081 644063 usertrap_amd64.go:122] [ 664: 665] Allocate a new trap: 0xc0005c7e60 13 D0713 05:18:02.812110 644063 usertrap_amd64.go:225] [ 664: 665] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:02.812222 644063 usertrap_amd64.go:212] [ 664: 665] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.812243 644063 usertrap_amd64.go:122] [ 664: 665] Allocate a new trap: 0xc0005c7e60 14 D0713 05:18:02.812251 644063 usertrap_amd64.go:225] [ 664: 665] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:02.812293 644063 task_signals.go:470] [ 664: 664] Notified of signal 23 D0713 05:18:02.812379 644063 task_signals.go:220] [ 664: 664] Signal 23: delivering to handler D0713 05:18:02.819300 644063 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.819331 644063 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc0005c7e60 15 D0713 05:18:02.819345 644063 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 05:18:02.819429 644063 task_exit.go:204] [ 664: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.819479 644063 task_exit.go:204] [ 664: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.819506 644063 task_signals.go:204] [ 664: 667] Signal 664, PID: 667, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.819603 644063 task_exit.go:204] [ 664: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.819619 644063 task_exit.go:204] [ 664: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.819623 644063 task_exit.go:204] [ 664: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.819502 644063 task_signals.go:204] [ 664: 665] Signal 664, PID: 665, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.819651 644063 task_exit.go:204] [ 664: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.819686 644063 task_exit.go:204] [ 664: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.819692 644063 task_exit.go:204] [ 664: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.819527 644063 task_signals.go:204] [ 664: 668] Signal 664, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.819718 644063 task_exit.go:204] [ 664: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.819723 644063 task_exit.go:204] [ 664: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.819727 644063 task_exit.go:204] [ 664: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.819553 644063 task_signals.go:204] [ 664: 666] Signal 664, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.819781 644063 task_exit.go:204] [ 664: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.821056 644063 task_exit.go:204] [ 664: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.821083 644063 task_exit.go:204] [ 664: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.821106 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.821138 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.821149 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.821280 644063 task_exit.go:204] [ 664: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.821997 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.823422 644063 syscalls.go:262] [ 669: 669] Allocating stack with size of 8388608 bytes D0713 05:18:02.823566 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.824070 644063 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.824180 644063 usertrap_amd64.go:106] [ 669: 669] Map a usertrap vma at 60000 D0713 05:18:02.824247 644063 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0012b7380 1 D0713 05:18:02.824280 644063 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:02.824901 644063 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.824933 644063 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0012b7380 2 D0713 05:18:02.825007 644063 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:02.825796 644063 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.825820 644063 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0012b7380 3 D0713 05:18:02.825828 644063 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:02.831069 644063 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.831165 644063 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0012b7380 4 D0713 05:18:02.831219 644063 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:02.832399 644063 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.832438 644063 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0012b7380 5 D0713 05:18:02.832449 644063 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:02.832513 644063 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.832521 644063 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0012b7380 6 D0713 05:18:02.832544 644063 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:02.832974 644063 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.832995 644063 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0012b7380 7 D0713 05:18:02.833008 644063 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:02.833202 644063 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.833232 644063 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc0012b7380 8 D0713 05:18:02.833245 644063 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:02.833805 644063 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.833830 644063 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc0012b7380 9 D0713 05:18:02.833850 644063 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:02.833882 644063 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.833889 644063 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0012b7380 10 D0713 05:18:02.833896 644063 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:02.841380 644063 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.841424 644063 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0012b7380 11 D0713 05:18:02.841439 644063 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:02.845091 644063 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.845135 644063 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc0012b7380 12 D0713 05:18:02.845152 644063 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:02.845240 644063 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.845251 644063 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc0012b7380 13 D0713 05:18:02.845260 644063 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:02.845279 644063 task_signals.go:470] [ 669: 669] Notified of signal 23 D0713 05:18:02.845337 644063 task_signals.go:220] [ 669: 669] Signal 23: delivering to handler D0713 05:18:02.853255 644063 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.853303 644063 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc0012b7380 14 D0713 05:18:02.853319 644063 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:02.853349 644063 task_exit.go:204] [ 669: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.853385 644063 task_signals.go:204] [ 669: 672] Signal 669, PID: 672, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.853414 644063 task_exit.go:204] [ 669: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.853447 644063 task_signals.go:204] [ 669: 671] Signal 669, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.853468 644063 task_signals.go:204] [ 669: 673] Signal 669, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.853513 644063 task_signals.go:204] [ 669: 670] Signal 669, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.853533 644063 task_exit.go:204] [ 669: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.853544 644063 task_exit.go:204] [ 669: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.853551 644063 task_exit.go:204] [ 669: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.853565 644063 task_exit.go:204] [ 669: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.853572 644063 task_exit.go:204] [ 669: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.853587 644063 task_exit.go:204] [ 669: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.853607 644063 task_exit.go:204] [ 669: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.853666 644063 task_exit.go:204] [ 669: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.853676 644063 task_exit.go:204] [ 669: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.853692 644063 task_exit.go:204] [ 669: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.854939 644063 task_exit.go:204] [ 669: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.854977 644063 task_exit.go:204] [ 669: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.854998 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.855035 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.855057 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.855179 644063 task_exit.go:204] [ 669: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.855947 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.857160 644063 syscalls.go:262] [ 674: 674] Allocating stack with size of 8388608 bytes D0713 05:18:02.857256 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.858631 644063 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.858697 644063 usertrap_amd64.go:106] [ 674: 674] Map a usertrap vma at 61000 D0713 05:18:02.858783 644063 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc00184c660 1 D0713 05:18:02.858816 644063 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:02.859190 644063 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.859216 644063 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc00184c660 2 D0713 05:18:02.859226 644063 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:02.859876 644063 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.859905 644063 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc00184c660 3 D0713 05:18:02.859918 644063 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:02.861589 644063 sampler.go:191] Time: Adjusting syscall overhead down to 588 D0713 05:18:02.865580 644063 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.865611 644063 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc00184c660 4 D0713 05:18:02.865622 644063 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:02.866594 644063 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.866623 644063 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc00184c660 5 D0713 05:18:02.866635 644063 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:02.866688 644063 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.866705 644063 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc00184c660 6 D0713 05:18:02.866712 644063 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:02.866903 644063 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.866919 644063 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc00184c660 7 D0713 05:18:02.866928 644063 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:02.867056 644063 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.867074 644063 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc00184c660 8 D0713 05:18:02.867082 644063 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:02.867223 644063 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.867246 644063 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc00184c660 9 D0713 05:18:02.867253 644063 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:02.867262 644063 usertrap_amd64.go:212] [ 674: 676] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:02.867267 644063 usertrap_amd64.go:122] [ 674: 676] Allocate a new trap: 0xc00184c660 10 D0713 05:18:02.867274 644063 usertrap_amd64.go:225] [ 674: 676] Apply the binary patch addr 46b6e0 trap addr 61320 ([184 24 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:02.867291 644063 usertrap_amd64.go:212] [ 674: 676] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.867304 644063 usertrap_amd64.go:122] [ 674: 676] Allocate a new trap: 0xc00184c660 11 D0713 05:18:02.867317 644063 usertrap_amd64.go:225] [ 674: 676] Apply the binary patch addr 46b57c trap addr 61370 ([184 202 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:02.875042 644063 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.875076 644063 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc00184c660 12 D0713 05:18:02.875087 644063 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:02.877594 644063 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.877631 644063 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc00184c660 13 D0713 05:18:02.877643 644063 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:02.877735 644063 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.877810 644063 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc00184c660 14 D0713 05:18:02.877826 644063 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:02.877896 644063 task_signals.go:470] [ 674: 674] Notified of signal 23 D0713 05:18:02.878016 644063 task_signals.go:220] [ 674: 674] Signal 23: delivering to handler D0713 05:18:02.885586 644063 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.885608 644063 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc00184c660 15 D0713 05:18:02.885622 644063 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 05:18:02.885896 644063 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.885938 644063 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.885971 644063 task_signals.go:204] [ 674: 675] Signal 674, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.885997 644063 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.885986 644063 task_signals.go:204] [ 674: 677] Signal 674, PID: 677, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.886005 644063 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.886036 644063 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.886071 644063 task_signals.go:204] [ 674: 678] Signal 674, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.886092 644063 task_signals.go:204] [ 674: 679] Signal 674, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.886102 644063 task_exit.go:204] [ 674: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.886122 644063 task_signals.go:204] [ 674: 676] Signal 674, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.886145 644063 task_exit.go:204] [ 674: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.886158 644063 task_exit.go:204] [ 674: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.886176 644063 task_exit.go:204] [ 674: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.886183 644063 task_exit.go:204] [ 674: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.886188 644063 task_exit.go:204] [ 674: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.886196 644063 task_exit.go:204] [ 674: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.886203 644063 task_exit.go:204] [ 674: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.886208 644063 task_exit.go:204] [ 674: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.886216 644063 task_exit.go:204] [ 674: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.887456 644063 task_exit.go:204] [ 674: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.887485 644063 task_exit.go:204] [ 674: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.887506 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.887532 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.887558 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.887631 644063 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.888336 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.889770 644063 syscalls.go:262] [ 680: 680] Allocating stack with size of 8388608 bytes D0713 05:18:02.890059 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.891317 644063 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.891388 644063 usertrap_amd64.go:106] [ 680: 680] Map a usertrap vma at 69000 D0713 05:18:02.891594 644063 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0017a24e0 1 D0713 05:18:02.891633 644063 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:02.891935 644063 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.891949 644063 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0017a24e0 2 D0713 05:18:02.891959 644063 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:02.892548 644063 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.892576 644063 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0017a24e0 3 D0713 05:18:02.892617 644063 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:02.900994 644063 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.901023 644063 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0017a24e0 4 D0713 05:18:02.901039 644063 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:02.903163 644063 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.903190 644063 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0017a24e0 5 D0713 05:18:02.903209 644063 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:02.903277 644063 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.903295 644063 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0017a24e0 6 D0713 05:18:02.903304 644063 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:02.903792 644063 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.903808 644063 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0017a24e0 7 D0713 05:18:02.903814 644063 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:02.904120 644063 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.904149 644063 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc0017a24e0 8 D0713 05:18:02.904162 644063 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:02.904426 644063 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.904488 644063 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc0017a24e0 9 D0713 05:18:02.904507 644063 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:02.904554 644063 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.904591 644063 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0017a24e0 10 D0713 05:18:02.904611 644063 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:02.912762 644063 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.912794 644063 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0017a24e0 11 D0713 05:18:02.912805 644063 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:02.915723 644063 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.915748 644063 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc0017a24e0 12 D0713 05:18:02.915760 644063 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:02.915793 644063 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.915800 644063 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc0017a24e0 13 D0713 05:18:02.915812 644063 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:02.915831 644063 task_signals.go:470] [ 680: 680] Notified of signal 23 D0713 05:18:02.915945 644063 task_signals.go:220] [ 680: 680] Signal 23: delivering to handler D0713 05:18:02.923621 644063 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.923655 644063 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0017a24e0 14 D0713 05:18:02.923673 644063 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:02.923717 644063 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.923891 644063 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.923937 644063 task_signals.go:204] [ 680: 682] Signal 680, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.923955 644063 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.924005 644063 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.924020 644063 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.924084 644063 task_signals.go:204] [ 680: 683] Signal 680, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.924102 644063 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.924111 644063 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.924116 644063 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.924128 644063 task_signals.go:204] [ 680: 681] Signal 680, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.924138 644063 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.924146 644063 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.924160 644063 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.924189 644063 task_signals.go:204] [ 680: 684] Signal 680, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.924212 644063 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.925460 644063 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.925473 644063 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.925484 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.925521 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.925530 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.925674 644063 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.926463 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.928637 644063 syscalls.go:262] [ 685: 685] Allocating stack with size of 8388608 bytes D0713 05:18:02.928736 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.930447 644063 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.930479 644063 usertrap_amd64.go:106] [ 685: 685] Map a usertrap vma at 65000 D0713 05:18:02.930622 644063 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc00184c8d0 1 D0713 05:18:02.930730 644063 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:02.931332 644063 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.931362 644063 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc00184c8d0 2 D0713 05:18:02.931374 644063 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:02.932136 644063 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.932161 644063 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc00184c8d0 3 D0713 05:18:02.932173 644063 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:02.938414 644063 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.938450 644063 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc00184c8d0 4 D0713 05:18:02.938460 644063 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:02.939689 644063 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.939723 644063 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc00184c8d0 5 D0713 05:18:02.939733 644063 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:02.939771 644063 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.939777 644063 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc00184c8d0 6 D0713 05:18:02.939784 644063 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:02.940223 644063 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.940257 644063 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc00184c8d0 7 D0713 05:18:02.940268 644063 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:02.940403 644063 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.940431 644063 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc00184c8d0 8 D0713 05:18:02.940441 644063 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:02.940590 644063 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.940616 644063 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc00184c8d0 9 D0713 05:18:02.940625 644063 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:02.940764 644063 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.940785 644063 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc00184c8d0 10 D0713 05:18:02.940795 644063 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:02.949142 644063 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.949183 644063 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc00184c8d0 11 D0713 05:18:02.949196 644063 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:02.951771 644063 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.951807 644063 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc00184c8d0 12 D0713 05:18:02.951820 644063 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:02.951857 644063 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.951876 644063 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc00184c8d0 13 D0713 05:18:02.951887 644063 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:02.951955 644063 task_signals.go:470] [ 685: 685] Notified of signal 23 D0713 05:18:02.952044 644063 task_signals.go:220] [ 685: 685] Signal 23: delivering to handler D0713 05:18:02.959663 644063 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.959692 644063 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc00184c8d0 14 D0713 05:18:02.959710 644063 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:02.959797 644063 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.959848 644063 task_signals.go:204] [ 685: 687] Signal 685, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.959848 644063 task_signals.go:204] [ 685: 686] Signal 685, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.959865 644063 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.959879 644063 task_signals.go:204] [ 685: 689] Signal 685, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.959892 644063 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.959887 644063 task_signals.go:204] [ 685: 688] Signal 685, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.959899 644063 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.959903 644063 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.959921 644063 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.959950 644063 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.959958 644063 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.959969 644063 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.960008 644063 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.960023 644063 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.960034 644063 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.961645 644063 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.963936 644063 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.963960 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.964631 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.964647 644063 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.964657 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.965438 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.966771 644063 syscalls.go:262] [ 690: 690] Allocating stack with size of 8388608 bytes D0713 05:18:02.966976 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.970400 644063 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.970453 644063 usertrap_amd64.go:106] [ 690: 690] Map a usertrap vma at 69000 D0713 05:18:02.970528 644063 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc00063e090 1 D0713 05:18:02.970554 644063 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:02.971012 644063 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.971040 644063 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc00063e090 2 D0713 05:18:02.971053 644063 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:02.971627 644063 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.971655 644063 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc00063e090 3 D0713 05:18:02.971668 644063 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:02.979764 644063 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.979794 644063 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc00063e090 4 D0713 05:18:02.979805 644063 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:02.981057 644063 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.981085 644063 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc00063e090 5 D0713 05:18:02.981094 644063 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:02.981130 644063 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.981135 644063 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc00063e090 6 D0713 05:18:02.981140 644063 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:02.981313 644063 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.981327 644063 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc00063e090 7 D0713 05:18:02.981332 644063 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:02.981465 644063 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.981490 644063 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc00063e090 8 D0713 05:18:02.981501 644063 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:02.981656 644063 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.981673 644063 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc00063e090 9 D0713 05:18:02.981681 644063 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:02.981796 644063 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.981816 644063 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc00063e090 10 D0713 05:18:02.981825 644063 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:02.990100 644063 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.990129 644063 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc00063e090 11 D0713 05:18:02.990138 644063 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:02.992662 644063 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.992693 644063 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc00063e090 12 D0713 05:18:02.992707 644063 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:02.992740 644063 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.992747 644063 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc00063e090 13 D0713 05:18:02.992754 644063 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:02.992771 644063 task_signals.go:470] [ 690: 690] Notified of signal 23 D0713 05:18:02.992843 644063 task_signals.go:179] [ 690: 690] Restarting syscall 202: interrupted by signal 23 D0713 05:18:02.992858 644063 task_signals.go:220] [ 690: 690] Signal 23: delivering to handler D0713 05:18:03.001224 644063 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.001274 644063 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc00063e090 14 D0713 05:18:03.001293 644063 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:03.001432 644063 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.001490 644063 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.001494 644063 task_signals.go:204] [ 690: 691] Signal 690, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.001525 644063 task_signals.go:204] [ 690: 693] Signal 690, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.001527 644063 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.001555 644063 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.001560 644063 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.001575 644063 task_signals.go:204] [ 690: 692] Signal 690, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.001584 644063 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.001604 644063 task_signals.go:204] [ 690: 694] Signal 690, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.001668 644063 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.001680 644063 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.001697 644063 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.001713 644063 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.001718 644063 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.001727 644063 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.003054 644063 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.003098 644063 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.003114 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.003154 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.003164 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.003306 644063 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.004104 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.005698 644063 syscalls.go:262] [ 695: 695] Allocating stack with size of 8388608 bytes D0713 05:18:03.005794 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.007540 644063 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.007592 644063 usertrap_amd64.go:106] [ 695: 695] Map a usertrap vma at 62000 D0713 05:18:03.007818 644063 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0007604b0 1 D0713 05:18:03.007918 644063 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:03.008286 644063 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.008301 644063 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0007604b0 2 D0713 05:18:03.008313 644063 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:03.009147 644063 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.009165 644063 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0007604b0 3 D0713 05:18:03.009177 644063 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:03.015915 644063 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.015940 644063 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0007604b0 4 D0713 05:18:03.015952 644063 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:03.017192 644063 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.017222 644063 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0007604b0 5 D0713 05:18:03.017233 644063 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:03.017304 644063 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.017355 644063 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0007604b0 6 D0713 05:18:03.017373 644063 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:03.017780 644063 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.017810 644063 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0007604b0 7 D0713 05:18:03.017827 644063 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:03.018101 644063 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.018129 644063 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc0007604b0 8 D0713 05:18:03.018139 644063 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:03.018298 644063 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.018326 644063 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc0007604b0 9 D0713 05:18:03.018338 644063 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:03.018435 644063 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.018461 644063 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0007604b0 10 D0713 05:18:03.018473 644063 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:03.026033 644063 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.026076 644063 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0007604b0 11 D0713 05:18:03.026093 644063 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:03.028671 644063 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.028694 644063 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc0007604b0 12 D0713 05:18:03.028706 644063 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:03.028730 644063 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.028737 644063 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc0007604b0 13 D0713 05:18:03.028743 644063 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:03.028761 644063 task_signals.go:470] [ 695: 695] Notified of signal 23 D0713 05:18:03.028840 644063 task_signals.go:220] [ 695: 695] Signal 23: delivering to handler I0713 05:18:03.039633 644063 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0713 05:18:03.039728 644063 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.039743 644063 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0007604b0 14 D0713 05:18:03.039763 644063 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:03.039834 644063 task_exit.go:204] [ 695: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.039865 644063 task_exit.go:204] [ 695: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.039888 644063 task_signals.go:204] [ 695: 696] Signal 695, PID: 696, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.039899 644063 task_exit.go:204] [ 695: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.039905 644063 task_exit.go:204] [ 695: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.039911 644063 task_exit.go:204] [ 695: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.039899 644063 task_signals.go:204] [ 695: 698] Signal 695, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.039931 644063 task_signals.go:204] [ 695: 699] Signal 695, PID: 699, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.039928 644063 task_signals.go:204] [ 695: 697] Signal 695, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.039936 644063 task_exit.go:204] [ 695: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.039962 644063 task_exit.go:204] [ 695: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.039983 644063 task_exit.go:204] [ 695: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.040002 644063 task_exit.go:204] [ 695: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.040011 644063 task_exit.go:204] [ 695: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.040025 644063 task_exit.go:204] [ 695: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.040038 644063 task_exit.go:204] [ 695: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.041315 644063 task_exit.go:204] [ 695: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.041353 644063 task_exit.go:204] [ 695: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.041368 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.041407 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.041438 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.041613 644063 task_exit.go:204] [ 695: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.042126 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.043874 644063 syscalls.go:262] [ 700: 700] Allocating stack with size of 8388608 bytes D0713 05:18:03.043999 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.046318 644063 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.046421 644063 usertrap_amd64.go:106] [ 700: 700] Map a usertrap vma at 63000 D0713 05:18:03.046507 644063 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0012b63f0 1 D0713 05:18:03.046553 644063 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:03.046961 644063 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.047001 644063 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0012b63f0 2 D0713 05:18:03.047019 644063 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:03.047717 644063 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.047746 644063 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0012b63f0 3 D0713 05:18:03.047762 644063 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:03.057949 644063 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.057992 644063 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0012b63f0 4 D0713 05:18:03.058007 644063 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:03.059243 644063 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.059283 644063 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0012b63f0 5 D0713 05:18:03.059303 644063 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:03.059516 644063 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.059565 644063 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0012b63f0 6 D0713 05:18:03.059583 644063 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:03.060021 644063 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.060052 644063 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0012b63f0 7 D0713 05:18:03.060065 644063 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:03.060294 644063 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.060320 644063 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc0012b63f0 8 D0713 05:18:03.060334 644063 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:03.060620 644063 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.060687 644063 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc0012b63f0 9 D0713 05:18:03.060794 644063 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:03.060925 644063 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.060982 644063 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0012b63f0 10 D0713 05:18:03.061056 644063 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:03.068528 644063 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.068609 644063 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0012b63f0 11 D0713 05:18:03.068641 644063 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:03.072564 644063 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.072603 644063 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc0012b63f0 12 D0713 05:18:03.072622 644063 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:03.072667 644063 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.072682 644063 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc0012b63f0 13 D0713 05:18:03.072694 644063 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:03.072751 644063 task_signals.go:470] [ 700: 700] Notified of signal 23 D0713 05:18:03.072792 644063 task_signals.go:179] [ 700: 700] Restarting syscall 202: interrupted by signal 23 D0713 05:18:03.072806 644063 task_signals.go:220] [ 700: 700] Signal 23: delivering to handler D0713 05:18:03.078292 644063 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.078325 644063 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc0012b63f0 14 D0713 05:18:03.078339 644063 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:03.078411 644063 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.078440 644063 task_signals.go:204] [ 700: 701] Signal 700, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.078448 644063 task_signals.go:204] [ 700: 704] Signal 700, PID: 704, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.078469 644063 task_signals.go:204] [ 700: 702] Signal 700, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.078475 644063 task_signals.go:204] [ 700: 705] Signal 700, PID: 705, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.078485 644063 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.078498 644063 task_signals.go:204] [ 700: 703] Signal 700, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.078500 644063 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.078513 644063 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.078519 644063 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.078530 644063 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.078566 644063 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.078582 644063 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.078606 644063 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.078614 644063 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.078629 644063 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.078639 644063 task_exit.go:204] [ 700: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.078646 644063 task_exit.go:204] [ 700: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.078651 644063 task_exit.go:204] [ 700: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.078660 644063 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.079902 644063 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.079935 644063 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.079950 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.080026 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.080051 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.080168 644063 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.080835 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.082052 644063 syscalls.go:262] [ 706: 706] Allocating stack with size of 8388608 bytes D0713 05:18:03.082237 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.085554 644063 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.085595 644063 usertrap_amd64.go:106] [ 706: 706] Map a usertrap vma at 60000 D0713 05:18:03.085673 644063 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc00063e6f0 1 D0713 05:18:03.085690 644063 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:03.086251 644063 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.086293 644063 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc00063e6f0 2 D0713 05:18:03.086304 644063 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:03.086971 644063 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.087000 644063 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc00063e6f0 3 D0713 05:18:03.087015 644063 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:03.093219 644063 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.093250 644063 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc00063e6f0 4 D0713 05:18:03.093263 644063 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:03.094611 644063 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.094653 644063 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc00063e6f0 5 D0713 05:18:03.094670 644063 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:03.094732 644063 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.094756 644063 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc00063e6f0 6 D0713 05:18:03.094773 644063 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:03.095056 644063 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.095086 644063 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc00063e6f0 7 D0713 05:18:03.095098 644063 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:03.097819 644063 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.097845 644063 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc00063e6f0 8 D0713 05:18:03.097856 644063 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:03.098189 644063 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.098213 644063 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc00063e6f0 9 D0713 05:18:03.098224 644063 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:03.098236 644063 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.098243 644063 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc00063e6f0 10 D0713 05:18:03.098304 644063 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:03.098403 644063 usertrap_amd64.go:212] [ 706: 709] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:03.098430 644063 usertrap_amd64.go:122] [ 706: 709] Allocate a new trap: 0xc00063e6f0 11 D0713 05:18:03.098456 644063 usertrap_amd64.go:225] [ 706: 709] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:03.108393 644063 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.108423 644063 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc00063e6f0 12 D0713 05:18:03.108437 644063 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:03.110629 644063 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.110663 644063 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc00063e6f0 13 D0713 05:18:03.110678 644063 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:03.110740 644063 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.110760 644063 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc00063e6f0 14 D0713 05:18:03.110783 644063 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:03.110837 644063 task_signals.go:470] [ 706: 706] Notified of signal 23 D0713 05:18:03.110911 644063 task_signals.go:220] [ 706: 706] Signal 23: delivering to handler D0713 05:18:03.118537 644063 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.118581 644063 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc00063e6f0 15 D0713 05:18:03.118594 644063 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 05:18:03.118650 644063 task_exit.go:204] [ 706: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.118683 644063 task_exit.go:204] [ 706: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.118711 644063 task_signals.go:204] [ 706: 709] Signal 706, PID: 709, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.118742 644063 task_exit.go:204] [ 706: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.118747 644063 task_exit.go:204] [ 706: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.118751 644063 task_exit.go:204] [ 706: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.118749 644063 task_signals.go:204] [ 706: 710] Signal 706, PID: 710, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.118769 644063 task_signals.go:204] [ 706: 707] Signal 706, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.118746 644063 task_signals.go:204] [ 706: 708] Signal 706, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.118786 644063 task_exit.go:204] [ 706: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.118776 644063 task_signals.go:204] [ 706: 711] Signal 706, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.118875 644063 task_exit.go:204] [ 706: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.118907 644063 task_exit.go:204] [ 706: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.118956 644063 task_exit.go:204] [ 706: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.118987 644063 task_exit.go:204] [ 706: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.119012 644063 task_exit.go:204] [ 706: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.119028 644063 task_exit.go:204] [ 706: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.119053 644063 task_exit.go:204] [ 706: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.119060 644063 task_exit.go:204] [ 706: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.119098 644063 task_exit.go:204] [ 706: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.120425 644063 task_exit.go:204] [ 706: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.120511 644063 task_exit.go:204] [ 706: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.120535 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.120590 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.120661 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.120771 644063 task_exit.go:204] [ 706: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.121592 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.123205 644063 syscalls.go:262] [ 712: 712] Allocating stack with size of 8388608 bytes D0713 05:18:03.123328 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.125209 644063 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.125253 644063 usertrap_amd64.go:106] [ 712: 712] Map a usertrap vma at 65000 D0713 05:18:03.125460 644063 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0014c20c0 1 D0713 05:18:03.125507 644063 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:03.125956 644063 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.126002 644063 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0014c20c0 2 D0713 05:18:03.126016 644063 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:03.126567 644063 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.126644 644063 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0014c20c0 3 D0713 05:18:03.126669 644063 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:03.133453 644063 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.133489 644063 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0014c20c0 4 D0713 05:18:03.133507 644063 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:03.135123 644063 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.135143 644063 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0014c20c0 5 D0713 05:18:03.135156 644063 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:03.135232 644063 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.135252 644063 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0014c20c0 6 D0713 05:18:03.135262 644063 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:03.135516 644063 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.135535 644063 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0014c20c0 7 D0713 05:18:03.135544 644063 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:03.135688 644063 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.135708 644063 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc0014c20c0 8 D0713 05:18:03.135720 644063 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:03.135947 644063 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.135995 644063 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc0014c20c0 9 D0713 05:18:03.136015 644063 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:03.136147 644063 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.136171 644063 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0014c20c0 10 D0713 05:18:03.136182 644063 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:03.136630 644063 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.136658 644063 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc0014c20c0 11 D0713 05:18:03.136671 644063 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:03.136717 644063 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.136736 644063 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc0014c20c0 12 D0713 05:18:03.136744 644063 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:03.136827 644063 task_signals.go:470] [ 712: 712] Notified of signal 23 D0713 05:18:03.136925 644063 task_signals.go:220] [ 712: 712] Signal 23: delivering to handler D0713 05:18:03.144083 644063 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.144178 644063 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0014c20c0 13 D0713 05:18:03.144197 644063 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:03.147219 644063 task_signals.go:470] [ 712: 712] Notified of signal 23 D0713 05:18:03.147291 644063 task_signals.go:220] [ 712: 712] Signal 23: delivering to handler D0713 05:18:03.155215 644063 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.155259 644063 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0014c20c0 14 D0713 05:18:03.155274 644063 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:03.155333 644063 task_exit.go:204] [ 712: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.155428 644063 task_exit.go:204] [ 712: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.155472 644063 task_signals.go:204] [ 712: 714] Signal 712, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.155501 644063 task_exit.go:204] [ 712: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.155519 644063 task_exit.go:204] [ 712: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.155526 644063 task_exit.go:204] [ 712: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.155543 644063 task_signals.go:204] [ 712: 713] Signal 712, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.155562 644063 task_exit.go:204] [ 712: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.155567 644063 task_exit.go:204] [ 712: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.155571 644063 task_exit.go:204] [ 712: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.155580 644063 task_signals.go:204] [ 712: 715] Signal 712, PID: 715, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.155586 644063 task_exit.go:204] [ 712: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.155592 644063 task_exit.go:204] [ 712: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.155596 644063 task_exit.go:204] [ 712: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.155606 644063 task_signals.go:204] [ 712: 716] Signal 712, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.155618 644063 task_exit.go:204] [ 712: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.156927 644063 task_exit.go:204] [ 712: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.156995 644063 task_exit.go:204] [ 712: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.157012 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.157042 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.157064 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.157175 644063 task_exit.go:204] [ 712: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.157854 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.159413 644063 syscalls.go:262] [ 717: 717] Allocating stack with size of 8388608 bytes D0713 05:18:03.159537 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.160350 644063 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.160395 644063 usertrap_amd64.go:106] [ 717: 717] Map a usertrap vma at 60000 D0713 05:18:03.160480 644063 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0012b6b10 1 D0713 05:18:03.160519 644063 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:03.160861 644063 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.160897 644063 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0012b6b10 2 D0713 05:18:03.160906 644063 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:03.161561 644063 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.161586 644063 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0012b6b10 3 D0713 05:18:03.161598 644063 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:03.169029 644063 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.169080 644063 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0012b6b10 4 D0713 05:18:03.169096 644063 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:03.171213 644063 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.171249 644063 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0012b6b10 5 D0713 05:18:03.171263 644063 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:03.171397 644063 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.171430 644063 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0012b6b10 6 D0713 05:18:03.171444 644063 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:03.171931 644063 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.171958 644063 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0012b6b10 7 D0713 05:18:03.171968 644063 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:03.172179 644063 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.172209 644063 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc0012b6b10 8 D0713 05:18:03.172238 644063 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:03.172518 644063 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.172538 644063 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc0012b6b10 9 D0713 05:18:03.172547 644063 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:03.172722 644063 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.172748 644063 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0012b6b10 10 D0713 05:18:03.172760 644063 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:03.182252 644063 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.182292 644063 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0012b6b10 11 D0713 05:18:03.182310 644063 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:03.183413 644063 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.183443 644063 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc0012b6b10 12 D0713 05:18:03.183458 644063 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:03.183495 644063 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.183518 644063 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc0012b6b10 13 D0713 05:18:03.183526 644063 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:03.183545 644063 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 05:18:03.183574 644063 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 05:18:03.194039 644063 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 05:18:03.194166 644063 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 05:18:03.194302 644063 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 05:18:03.194366 644063 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 05:18:03.194543 644063 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 05:18:03.196072 644063 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 05:18:03.196451 644063 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.196487 644063 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0012b6b10 14 D0713 05:18:03.196506 644063 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:03.196567 644063 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.196605 644063 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.196633 644063 task_signals.go:204] [ 717: 718] Signal 717, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.196657 644063 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.196678 644063 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.196684 644063 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.196707 644063 task_signals.go:204] [ 717: 719] Signal 717, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.196720 644063 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.196727 644063 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.196733 644063 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.196748 644063 task_signals.go:204] [ 717: 720] Signal 717, PID: 720, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.196760 644063 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.196769 644063 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.196776 644063 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.196797 644063 task_signals.go:204] [ 717: 721] Signal 717, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.196810 644063 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.198210 644063 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.198230 644063 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.198243 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.198311 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.198426 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.198465 644063 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.199074 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.200536 644063 syscalls.go:262] [ 722: 722] Allocating stack with size of 8388608 bytes D0713 05:18:03.200647 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.202267 644063 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.202305 644063 usertrap_amd64.go:106] [ 722: 722] Map a usertrap vma at 60000 D0713 05:18:03.202383 644063 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc0014c2570 1 D0713 05:18:03.202406 644063 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:03.202625 644063 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.202663 644063 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc0014c2570 2 D0713 05:18:03.202689 644063 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:03.203525 644063 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.203548 644063 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc0014c2570 3 D0713 05:18:03.203559 644063 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:03.210630 644063 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.210684 644063 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc0014c2570 4 D0713 05:18:03.210704 644063 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:03.212198 644063 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.212240 644063 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc0014c2570 5 D0713 05:18:03.212255 644063 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:03.212366 644063 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.212387 644063 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc0014c2570 6 D0713 05:18:03.212396 644063 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:03.212677 644063 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.212701 644063 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc0014c2570 7 D0713 05:18:03.212710 644063 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:03.213074 644063 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.213259 644063 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc0014c2570 8 D0713 05:18:03.213290 644063 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:03.213328 644063 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.213335 644063 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc0014c2570 9 D0713 05:18:03.213343 644063 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:03.213545 644063 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.213566 644063 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc0014c2570 10 D0713 05:18:03.213603 644063 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:03.214099 644063 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.214122 644063 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc0014c2570 11 D0713 05:18:03.214133 644063 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:03.214180 644063 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.214187 644063 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc0014c2570 12 D0713 05:18:03.214195 644063 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:03.214245 644063 task_signals.go:470] [ 722: 722] Notified of signal 23 D0713 05:18:03.214282 644063 task_signals.go:220] [ 722: 722] Signal 23: delivering to handler D0713 05:18:03.221258 644063 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.221284 644063 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc0014c2570 13 D0713 05:18:03.221298 644063 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:03.224871 644063 task_signals.go:470] [ 722: 722] Notified of signal 23 D0713 05:18:03.225003 644063 task_signals.go:220] [ 722: 722] Signal 23: delivering to handler D0713 05:18:03.232512 644063 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.232547 644063 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc0014c2570 14 D0713 05:18:03.232560 644063 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:03.232617 644063 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.232661 644063 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.232687 644063 task_signals.go:204] [ 722: 723] Signal 722, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.232715 644063 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.232723 644063 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.232729 644063 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.232715 644063 task_signals.go:204] [ 722: 726] Signal 722, PID: 726, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.232746 644063 task_signals.go:204] [ 722: 724] Signal 722, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.232747 644063 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.232772 644063 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.232780 644063 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.232799 644063 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.232807 644063 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.232812 644063 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.232829 644063 task_signals.go:204] [ 722: 725] Signal 722, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.232849 644063 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.245271 644063 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.245309 644063 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.245325 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.249043 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.249344 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.249177 644063 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.250927 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.252327 644063 syscalls.go:262] [ 727: 727] Allocating stack with size of 8388608 bytes D0713 05:18:03.252439 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.256745 644063 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.256779 644063 usertrap_amd64.go:106] [ 727: 727] Map a usertrap vma at 69000 D0713 05:18:03.256892 644063 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00063cdb0 1 D0713 05:18:03.256930 644063 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:03.257318 644063 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.257337 644063 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00063cdb0 2 D0713 05:18:03.257347 644063 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:03.258030 644063 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.258056 644063 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00063cdb0 3 D0713 05:18:03.258068 644063 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:03.264849 644063 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.265020 644063 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00063cdb0 4 D0713 05:18:03.265053 644063 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:03.266500 644063 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.266653 644063 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00063cdb0 5 D0713 05:18:03.266679 644063 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:03.266762 644063 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.266784 644063 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00063cdb0 6 D0713 05:18:03.266795 644063 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:03.267217 644063 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.267328 644063 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00063cdb0 7 D0713 05:18:03.267419 644063 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:03.267706 644063 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.267738 644063 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc00063cdb0 8 D0713 05:18:03.267753 644063 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:03.268007 644063 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.268147 644063 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc00063cdb0 9 D0713 05:18:03.268174 644063 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:03.268211 644063 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.268219 644063 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00063cdb0 10 D0713 05:18:03.268282 644063 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:03.277619 644063 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.277675 644063 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00063cdb0 11 D0713 05:18:03.277694 644063 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:03.280987 644063 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.281017 644063 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc00063cdb0 12 D0713 05:18:03.281037 644063 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:03.281102 644063 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.281114 644063 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc00063cdb0 13 D0713 05:18:03.281121 644063 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:03.281140 644063 task_signals.go:470] [ 727: 727] Notified of signal 23 D0713 05:18:03.281323 644063 task_signals.go:220] [ 727: 727] Signal 23: delivering to handler I0713 05:18:03.293478 644063 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0713 05:18:03.295729 644063 task_signals.go:470] [ 727: 727] Notified of signal 23 D0713 05:18:03.295726 644063 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.295809 644063 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00063cdb0 14 D0713 05:18:03.295830 644063 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:03.295845 644063 task_signals.go:220] [ 727: 727] Signal 23: delivering to handler D0713 05:18:03.295933 644063 task_exit.go:204] [ 727: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.295987 644063 task_signals.go:204] [ 727: 730] Signal 727, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.295988 644063 task_signals.go:204] [ 727: 729] Signal 727, PID: 729, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.295999 644063 task_signals.go:204] [ 727: 731] Signal 727, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.296012 644063 task_exit.go:204] [ 727: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.296065 644063 task_signals.go:204] [ 727: 728] Signal 727, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.296110 644063 task_exit.go:204] [ 727: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.296146 644063 task_exit.go:204] [ 727: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.296154 644063 task_exit.go:204] [ 727: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.296183 644063 task_exit.go:204] [ 727: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.296192 644063 task_exit.go:204] [ 727: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.296198 644063 task_exit.go:204] [ 727: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.296209 644063 task_exit.go:204] [ 727: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.296219 644063 task_exit.go:204] [ 727: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.296226 644063 task_exit.go:204] [ 727: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.296238 644063 task_exit.go:204] [ 727: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.297538 644063 task_exit.go:204] [ 727: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.297575 644063 task_exit.go:204] [ 727: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.297591 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.297659 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.297681 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.297890 644063 task_exit.go:204] [ 727: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.298483 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.299799 644063 syscalls.go:262] [ 732: 732] Allocating stack with size of 8388608 bytes D0713 05:18:03.299886 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.304725 644063 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.304757 644063 usertrap_amd64.go:106] [ 732: 732] Map a usertrap vma at 68000 D0713 05:18:03.304837 644063 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc00063f290 1 D0713 05:18:03.304860 644063 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:03.305120 644063 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.305132 644063 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc00063f290 2 D0713 05:18:03.305141 644063 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:03.305589 644063 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.305603 644063 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc00063f290 3 D0713 05:18:03.305612 644063 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:03.312135 644063 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.312178 644063 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc00063f290 4 D0713 05:18:03.312192 644063 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:03.317078 644063 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.317105 644063 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc00063f290 5 D0713 05:18:03.317133 644063 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:03.317162 644063 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.317166 644063 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc00063f290 6 D0713 05:18:03.317171 644063 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:03.317319 644063 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.317324 644063 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc00063f290 7 D0713 05:18:03.317331 644063 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:03.317423 644063 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.317429 644063 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc00063f290 8 D0713 05:18:03.317434 644063 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:03.317554 644063 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.317560 644063 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc00063f290 9 D0713 05:18:03.317565 644063 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:03.317578 644063 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.317582 644063 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc00063f290 10 D0713 05:18:03.317586 644063 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:03.324839 644063 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.324875 644063 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc00063f290 11 D0713 05:18:03.324888 644063 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:03.328090 644063 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.328112 644063 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc00063f290 12 D0713 05:18:03.328123 644063 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:03.328143 644063 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.328148 644063 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc00063f290 13 D0713 05:18:03.328155 644063 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:03.328168 644063 task_signals.go:470] [ 732: 732] Notified of signal 23 D0713 05:18:03.329124 644063 task_signals.go:220] [ 732: 732] Signal 23: delivering to handler D0713 05:18:03.345122 644063 task_signals.go:470] [ 732: 732] Notified of signal 23 D0713 05:18:03.345212 644063 task_signals.go:220] [ 732: 732] Signal 23: delivering to handler D0713 05:18:03.345441 644063 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.345466 644063 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc00063f290 14 D0713 05:18:03.345480 644063 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:03.345524 644063 task_exit.go:204] [ 732: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.345561 644063 task_exit.go:204] [ 732: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.345588 644063 task_signals.go:204] [ 732: 733] Signal 732, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.345614 644063 task_exit.go:204] [ 732: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.345623 644063 task_exit.go:204] [ 732: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.345628 644063 task_exit.go:204] [ 732: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.345647 644063 task_signals.go:204] [ 732: 734] Signal 732, PID: 734, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.345669 644063 task_exit.go:204] [ 732: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.345675 644063 task_exit.go:204] [ 732: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.345682 644063 task_exit.go:204] [ 732: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.345696 644063 task_signals.go:204] [ 732: 735] Signal 732, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.345717 644063 task_exit.go:204] [ 732: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.345725 644063 task_exit.go:204] [ 732: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.345731 644063 task_exit.go:204] [ 732: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.345743 644063 task_signals.go:204] [ 732: 736] Signal 732, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.345764 644063 task_exit.go:204] [ 732: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.346860 644063 task_exit.go:204] [ 732: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.346890 644063 task_exit.go:204] [ 732: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.346910 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.346937 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.346960 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.347088 644063 task_exit.go:204] [ 732: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.347641 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.348726 644063 syscalls.go:262] [ 737: 737] Allocating stack with size of 8388608 bytes D0713 05:18:03.348820 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.360377 644063 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.360413 644063 usertrap_amd64.go:106] [ 737: 737] Map a usertrap vma at 64000 D0713 05:18:03.360478 644063 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00184db00 1 D0713 05:18:03.360501 644063 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:03.361733 644063 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.361756 644063 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00184db00 2 D0713 05:18:03.361766 644063 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:03.365003 644063 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.365067 644063 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00184db00 3 D0713 05:18:03.365081 644063 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:03.371138 644063 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.371180 644063 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00184db00 4 D0713 05:18:03.371196 644063 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:03.372664 644063 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.372711 644063 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00184db00 5 D0713 05:18:03.372727 644063 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:03.372770 644063 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.372785 644063 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00184db00 6 D0713 05:18:03.372793 644063 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:03.373382 644063 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.373414 644063 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00184db00 7 D0713 05:18:03.373425 644063 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:03.375288 644063 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.375313 644063 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc00184db00 8 D0713 05:18:03.375329 644063 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:03.375688 644063 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.375711 644063 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc00184db00 9 D0713 05:18:03.375723 644063 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:03.375742 644063 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.375748 644063 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00184db00 10 D0713 05:18:03.375755 644063 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:03.383684 644063 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.383698 644063 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00184db00 11 D0713 05:18:03.383708 644063 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:03.387508 644063 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.387562 644063 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc00184db00 12 D0713 05:18:03.387580 644063 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:03.387657 644063 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.387683 644063 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc00184db00 13 D0713 05:18:03.387693 644063 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:03.387734 644063 task_signals.go:470] [ 737: 737] Notified of signal 23 D0713 05:18:03.389042 644063 task_signals.go:220] [ 737: 737] Signal 23: delivering to handler I0713 05:18:03.396336 644063 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0713 05:18:03.396419 644063 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.396433 644063 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc00184db00 14 D0713 05:18:03.396444 644063 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:03.396496 644063 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.396525 644063 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.396549 644063 task_signals.go:204] [ 737: 740] Signal 737, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.396549 644063 task_signals.go:204] [ 737: 739] Signal 737, PID: 739, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.396563 644063 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.396583 644063 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.396583 644063 task_signals.go:204] [ 737: 741] Signal 737, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.396594 644063 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.396608 644063 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.396616 644063 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.396621 644063 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.396631 644063 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.396641 644063 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.396647 644063 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.396659 644063 task_signals.go:204] [ 737: 738] Signal 737, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.396668 644063 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.397998 644063 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.398033 644063 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.398052 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.398083 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.398092 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.398175 644063 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.399062 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.400314 644063 syscalls.go:262] [ 742: 742] Allocating stack with size of 8388608 bytes D0713 05:18:03.400448 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.401422 644063 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.401478 644063 usertrap_amd64.go:106] [ 742: 742] Map a usertrap vma at 66000 D0713 05:18:03.401570 644063 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00063d650 1 D0713 05:18:03.401607 644063 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:03.402025 644063 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.402056 644063 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00063d650 2 D0713 05:18:03.402068 644063 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:03.402981 644063 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.403009 644063 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00063d650 3 D0713 05:18:03.403019 644063 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:03.410181 644063 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.410217 644063 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00063d650 4 D0713 05:18:03.410231 644063 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:03.411404 644063 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.411431 644063 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00063d650 5 D0713 05:18:03.411442 644063 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:03.411660 644063 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.411683 644063 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00063d650 6 D0713 05:18:03.411695 644063 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:03.412186 644063 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.412207 644063 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00063d650 7 D0713 05:18:03.412216 644063 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:03.412481 644063 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.412513 644063 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc00063d650 8 D0713 05:18:03.412528 644063 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:03.412708 644063 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.412734 644063 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc00063d650 9 D0713 05:18:03.412742 644063 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:03.412897 644063 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.412922 644063 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00063d650 10 D0713 05:18:03.412933 644063 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:03.413058 644063 usertrap_amd64.go:212] [ 742: 745] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:03.413137 644063 usertrap_amd64.go:122] [ 742: 745] Allocate a new trap: 0xc00063d650 11 D0713 05:18:03.413154 644063 usertrap_amd64.go:225] [ 742: 745] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:03.421093 644063 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.421134 644063 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00063d650 12 D0713 05:18:03.421148 644063 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:03.425066 644063 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.425099 644063 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc00063d650 13 D0713 05:18:03.425113 644063 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:03.425154 644063 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.425161 644063 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc00063d650 14 D0713 05:18:03.425170 644063 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:03.425243 644063 task_signals.go:470] [ 742: 742] Notified of signal 23 D0713 05:18:03.425348 644063 task_signals.go:220] [ 742: 742] Signal 23: delivering to handler D0713 05:18:03.432537 644063 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.432580 644063 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc00063d650 15 D0713 05:18:03.432597 644063 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 05:18:03.432669 644063 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.432715 644063 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.432746 644063 task_signals.go:204] [ 742: 743] Signal 742, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.432762 644063 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.432771 644063 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.432778 644063 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.432805 644063 task_signals.go:204] [ 742: 744] Signal 742, PID: 744, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.432824 644063 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.432831 644063 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.432836 644063 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.432822 644063 task_signals.go:204] [ 742: 745] Signal 742, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.432855 644063 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.432887 644063 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.432897 644063 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.432921 644063 task_signals.go:204] [ 742: 746] Signal 742, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.432977 644063 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.434150 644063 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.434192 644063 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.434206 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.434233 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.434262 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.434381 644063 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.435166 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.436681 644063 syscalls.go:262] [ 747: 747] Allocating stack with size of 8388608 bytes D0713 05:18:03.436801 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.437969 644063 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.438057 644063 usertrap_amd64.go:106] [ 747: 747] Map a usertrap vma at 66000 D0713 05:18:03.438168 644063 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc0002ae000 1 D0713 05:18:03.438207 644063 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:03.438452 644063 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.438513 644063 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc0002ae000 2 D0713 05:18:03.438534 644063 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:03.441446 644063 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.441475 644063 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc0002ae000 3 D0713 05:18:03.441487 644063 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:03.447859 644063 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.447892 644063 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc0002ae000 4 D0713 05:18:03.447904 644063 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:03.448905 644063 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.448982 644063 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc0002ae000 5 D0713 05:18:03.449004 644063 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:03.449076 644063 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.449093 644063 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc0002ae000 6 D0713 05:18:03.449101 644063 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:03.449460 644063 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.449482 644063 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc0002ae000 7 D0713 05:18:03.449494 644063 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:03.449700 644063 usertrap_amd64.go:212] [ 747: 748] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.449772 644063 usertrap_amd64.go:122] [ 747: 748] Allocate a new trap: 0xc0002ae000 8 D0713 05:18:03.449848 644063 usertrap_amd64.go:225] [ 747: 748] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:03.449995 644063 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.450052 644063 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc0002ae000 9 D0713 05:18:03.450185 644063 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:03.450330 644063 usertrap_amd64.go:212] [ 747: 748] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.450358 644063 usertrap_amd64.go:122] [ 747: 748] Allocate a new trap: 0xc0002ae000 10 D0713 05:18:03.450370 644063 usertrap_amd64.go:225] [ 747: 748] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:03.457698 644063 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.457729 644063 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc0002ae000 11 D0713 05:18:03.457740 644063 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:03.460663 644063 usertrap_amd64.go:212] [ 747: 748] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.460698 644063 usertrap_amd64.go:122] [ 747: 748] Allocate a new trap: 0xc0002ae000 12 D0713 05:18:03.460712 644063 usertrap_amd64.go:225] [ 747: 748] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:03.460759 644063 usertrap_amd64.go:212] [ 747: 748] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.460769 644063 usertrap_amd64.go:122] [ 747: 748] Allocate a new trap: 0xc0002ae000 13 D0713 05:18:03.460780 644063 usertrap_amd64.go:225] [ 747: 748] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:03.460839 644063 task_signals.go:470] [ 747: 747] Notified of signal 23 D0713 05:18:03.460983 644063 task_signals.go:220] [ 747: 747] Signal 23: delivering to handler I0713 05:18:03.468569 644063 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0713 05:18:03.468647 644063 usertrap_amd64.go:212] [ 747: 747] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.468660 644063 usertrap_amd64.go:122] [ 747: 747] Allocate a new trap: 0xc0002ae000 14 D0713 05:18:03.468670 644063 usertrap_amd64.go:225] [ 747: 747] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:03.468717 644063 task_exit.go:204] [ 747: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.468758 644063 task_exit.go:204] [ 747: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.468773 644063 task_signals.go:204] [ 747: 750] Signal 747, PID: 750, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.468785 644063 task_signals.go:204] [ 747: 749] Signal 747, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.468806 644063 task_signals.go:204] [ 747: 751] Signal 747, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.468827 644063 task_exit.go:204] [ 747: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.468912 644063 task_signals.go:204] [ 747: 748] Signal 747, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.468924 644063 task_exit.go:204] [ 747: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.468930 644063 task_exit.go:204] [ 747: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.468982 644063 task_exit.go:204] [ 747: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.469002 644063 task_exit.go:204] [ 747: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.469009 644063 task_exit.go:204] [ 747: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.469020 644063 task_exit.go:204] [ 747: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.469028 644063 task_exit.go:204] [ 747: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.469033 644063 task_exit.go:204] [ 747: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.469043 644063 task_exit.go:204] [ 747: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.470129 644063 task_exit.go:204] [ 747: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.470153 644063 task_exit.go:204] [ 747: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.470164 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.470810 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.470889 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.471151 644063 task_exit.go:204] [ 747: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.471651 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.473158 644063 syscalls.go:262] [ 752: 752] Allocating stack with size of 8388608 bytes D0713 05:18:03.473259 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.474452 644063 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.474502 644063 usertrap_amd64.go:106] [ 752: 752] Map a usertrap vma at 65000 D0713 05:18:03.474654 644063 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0002ae3c0 1 D0713 05:18:03.474764 644063 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:03.475169 644063 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.475197 644063 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0002ae3c0 2 D0713 05:18:03.475211 644063 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:03.475645 644063 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.475717 644063 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0002ae3c0 3 D0713 05:18:03.475742 644063 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:03.483042 644063 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.483081 644063 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0002ae3c0 4 D0713 05:18:03.483094 644063 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:03.484349 644063 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.484384 644063 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0002ae3c0 5 D0713 05:18:03.484394 644063 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:03.484513 644063 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.484520 644063 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0002ae3c0 6 D0713 05:18:03.484525 644063 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:03.484711 644063 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.484731 644063 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0002ae3c0 7 D0713 05:18:03.484737 644063 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:03.484879 644063 usertrap_amd64.go:212] [ 752: 753] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.484890 644063 usertrap_amd64.go:122] [ 752: 753] Allocate a new trap: 0xc0002ae3c0 8 D0713 05:18:03.484899 644063 usertrap_amd64.go:225] [ 752: 753] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:03.485133 644063 usertrap_amd64.go:212] [ 752: 753] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:03.485158 644063 usertrap_amd64.go:122] [ 752: 753] Allocate a new trap: 0xc0002ae3c0 9 D0713 05:18:03.485169 644063 usertrap_amd64.go:225] [ 752: 753] Apply the binary patch addr 46b6e0 trap addr 652d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:03.485246 644063 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.485257 644063 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0002ae3c0 10 D0713 05:18:03.485266 644063 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:03.485361 644063 usertrap_amd64.go:212] [ 752: 753] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.485388 644063 usertrap_amd64.go:122] [ 752: 753] Allocate a new trap: 0xc0002ae3c0 11 D0713 05:18:03.485401 644063 usertrap_amd64.go:225] [ 752: 753] Apply the binary patch addr 46af76 trap addr 65370 ([184 35 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:03.485754 644063 usertrap_amd64.go:212] [ 752: 753] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.485772 644063 usertrap_amd64.go:122] [ 752: 753] Allocate a new trap: 0xc0002ae3c0 12 D0713 05:18:03.485782 644063 usertrap_amd64.go:225] [ 752: 753] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:03.485843 644063 usertrap_amd64.go:212] [ 752: 753] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.485855 644063 usertrap_amd64.go:122] [ 752: 753] Allocate a new trap: 0xc0002ae3c0 13 D0713 05:18:03.485864 644063 usertrap_amd64.go:225] [ 752: 753] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:03.485903 644063 task_signals.go:470] [ 752: 752] Notified of signal 23 D0713 05:18:03.485944 644063 task_signals.go:220] [ 752: 752] Signal 23: delivering to handler D0713 05:18:03.493201 644063 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.493243 644063 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0002ae3c0 14 D0713 05:18:03.493257 644063 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46af29 trap addr 65460 ([184 37 1 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:03.497012 644063 task_signals.go:470] [ 752: 752] Notified of signal 23 D0713 05:18:03.497094 644063 task_signals.go:220] [ 752: 752] Signal 23: delivering to handler I0713 05:18:03.504015 644063 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0713 05:18:03.504159 644063 usertrap_amd64.go:212] [ 752: 752] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.504185 644063 usertrap_amd64.go:122] [ 752: 752] Allocate a new trap: 0xc0002ae3c0 15 D0713 05:18:03.504197 644063 usertrap_amd64.go:225] [ 752: 752] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 05:18:03.504249 644063 task_exit.go:204] [ 752: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.504279 644063 task_exit.go:204] [ 752: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.504305 644063 task_signals.go:204] [ 752: 755] Signal 752, PID: 755, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.504312 644063 task_signals.go:204] [ 752: 756] Signal 752, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.504322 644063 task_signals.go:204] [ 752: 754] Signal 752, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.504333 644063 task_exit.go:204] [ 752: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.504345 644063 task_signals.go:204] [ 752: 753] Signal 752, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.504367 644063 task_exit.go:204] [ 752: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.504373 644063 task_exit.go:204] [ 752: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.504387 644063 task_exit.go:204] [ 752: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.504403 644063 task_exit.go:204] [ 752: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.504410 644063 task_exit.go:204] [ 752: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.504416 644063 task_exit.go:204] [ 752: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.504421 644063 task_exit.go:204] [ 752: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.504424 644063 task_exit.go:204] [ 752: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.504437 644063 task_exit.go:204] [ 752: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.505587 644063 task_exit.go:204] [ 752: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.505614 644063 task_exit.go:204] [ 752: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.505634 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.505694 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.505724 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.505850 644063 task_exit.go:204] [ 752: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.506401 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.507668 644063 syscalls.go:262] [ 757: 757] Allocating stack with size of 8388608 bytes D0713 05:18:03.507813 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.507852 644063 task_signals.go:481] [ 6: 20] No task notified of signal 23 D0713 05:18:03.507933 644063 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 05:18:03.507998 644063 task_signals.go:470] [ 6: 20] Notified of signal 23 D0713 05:18:03.508034 644063 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 05:18:03.509290 644063 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.509331 644063 usertrap_amd64.go:106] [ 757: 757] Map a usertrap vma at 62000 D0713 05:18:03.509440 644063 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc00044c1b0 1 D0713 05:18:03.509476 644063 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:03.509847 644063 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.509882 644063 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc00044c1b0 2 D0713 05:18:03.509897 644063 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:03.510606 644063 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.510640 644063 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc00044c1b0 3 D0713 05:18:03.510653 644063 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:03.517106 644063 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.517145 644063 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc00044c1b0 4 D0713 05:18:03.517161 644063 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:03.519131 644063 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.519168 644063 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc00044c1b0 5 D0713 05:18:03.519183 644063 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:03.519263 644063 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.519285 644063 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc00044c1b0 6 D0713 05:18:03.519293 644063 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:03.519707 644063 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.519729 644063 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc00044c1b0 7 D0713 05:18:03.519735 644063 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:03.520087 644063 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.520106 644063 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc00044c1b0 8 D0713 05:18:03.520114 644063 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:03.520198 644063 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.520208 644063 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc00044c1b0 9 D0713 05:18:03.520213 644063 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:03.520369 644063 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.520395 644063 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc00044c1b0 10 D0713 05:18:03.520406 644063 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:03.520595 644063 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:03.520620 644063 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc00044c1b0 11 D0713 05:18:03.520630 644063 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:03.529923 644063 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.529958 644063 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc00044c1b0 12 D0713 05:18:03.529969 644063 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:03.532276 644063 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.532302 644063 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc00044c1b0 13 D0713 05:18:03.532315 644063 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:03.532363 644063 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.532386 644063 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc00044c1b0 14 D0713 05:18:03.532399 644063 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:03.532552 644063 task_signals.go:470] [ 757: 757] Notified of signal 23 D0713 05:18:03.532633 644063 task_signals.go:220] [ 757: 757] Signal 23: delivering to handler D0713 05:18:03.540869 644063 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.540984 644063 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc00044c1b0 15 D0713 05:18:03.541001 644063 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 05:18:03.541078 644063 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.541101 644063 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.541123 644063 task_signals.go:204] [ 757: 760] Signal 757, PID: 760, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.541143 644063 task_signals.go:204] [ 757: 761] Signal 757, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.541118 644063 task_signals.go:204] [ 757: 759] Signal 757, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.541138 644063 task_signals.go:204] [ 757: 758] Signal 757, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.541160 644063 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.541179 644063 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.541190 644063 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.541203 644063 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.541216 644063 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.541222 644063 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.541232 644063 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.541250 644063 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.541256 644063 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.541266 644063 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.542485 644063 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.542571 644063 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.542586 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.542631 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.542654 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.542662 644063 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.543065 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.544555 644063 syscalls.go:262] [ 762: 762] Allocating stack with size of 8388608 bytes D0713 05:18:03.544703 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.547350 644063 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.547400 644063 usertrap_amd64.go:106] [ 762: 762] Map a usertrap vma at 6a000 D0713 05:18:03.547487 644063 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0012b79b0 1 D0713 05:18:03.547513 644063 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:03.547763 644063 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.547787 644063 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0012b79b0 2 D0713 05:18:03.547796 644063 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:03.548285 644063 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.548307 644063 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0012b79b0 3 D0713 05:18:03.548323 644063 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:03.555290 644063 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.555326 644063 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0012b79b0 4 D0713 05:18:03.555338 644063 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:03.556493 644063 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.556513 644063 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0012b79b0 5 D0713 05:18:03.556521 644063 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:03.556571 644063 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.556576 644063 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0012b79b0 6 D0713 05:18:03.556581 644063 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:03.556733 644063 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.556746 644063 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0012b79b0 7 D0713 05:18:03.556751 644063 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:03.556855 644063 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.556872 644063 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc0012b79b0 8 D0713 05:18:03.556880 644063 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:03.557117 644063 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.557143 644063 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc0012b79b0 9 D0713 05:18:03.557154 644063 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:03.557221 644063 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.557231 644063 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0012b79b0 10 D0713 05:18:03.557239 644063 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:03.563731 644063 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.563755 644063 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0012b79b0 11 D0713 05:18:03.563766 644063 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:03.567403 644063 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.567446 644063 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc0012b79b0 12 D0713 05:18:03.567473 644063 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:03.567522 644063 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.567539 644063 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc0012b79b0 13 D0713 05:18:03.567548 644063 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:03.567598 644063 task_signals.go:470] [ 762: 762] Notified of signal 23 D0713 05:18:03.567735 644063 task_signals.go:220] [ 762: 762] Signal 23: delivering to handler D0713 05:18:03.574154 644063 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.574180 644063 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc0012b79b0 14 D0713 05:18:03.574191 644063 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:03.574257 644063 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.574281 644063 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.574308 644063 task_signals.go:204] [ 762: 765] Signal 762, PID: 765, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.574333 644063 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.574318 644063 task_signals.go:204] [ 762: 764] Signal 762, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.574341 644063 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.574359 644063 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.574331 644063 task_signals.go:204] [ 762: 763] Signal 762, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.574402 644063 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.574423 644063 task_signals.go:204] [ 762: 766] Signal 762, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.574447 644063 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.574471 644063 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.574483 644063 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.574492 644063 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.574497 644063 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.574506 644063 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.575775 644063 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.575810 644063 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.575823 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.575855 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.575873 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.575959 644063 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.576907 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.578061 644063 syscalls.go:262] [ 767: 767] Allocating stack with size of 8388608 bytes D0713 05:18:03.578159 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.579443 644063 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.579479 644063 usertrap_amd64.go:106] [ 767: 767] Map a usertrap vma at 63000 D0713 05:18:03.579581 644063 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc00044c8a0 1 D0713 05:18:03.579603 644063 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:03.579993 644063 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.580022 644063 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc00044c8a0 2 D0713 05:18:03.580035 644063 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:03.580811 644063 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.580848 644063 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc00044c8a0 3 D0713 05:18:03.580862 644063 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:03.586927 644063 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.586979 644063 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc00044c8a0 4 D0713 05:18:03.586999 644063 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:03.588033 644063 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.588060 644063 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc00044c8a0 5 D0713 05:18:03.588068 644063 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:03.588121 644063 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.588138 644063 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc00044c8a0 6 D0713 05:18:03.588153 644063 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:03.588420 644063 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.588427 644063 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc00044c8a0 7 D0713 05:18:03.588433 644063 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:03.588582 644063 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.588616 644063 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc00044c8a0 8 D0713 05:18:03.588631 644063 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:03.588866 644063 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.588893 644063 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc00044c8a0 9 D0713 05:18:03.588906 644063 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:03.588929 644063 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.588991 644063 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc00044c8a0 10 D0713 05:18:03.589002 644063 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:03.596337 644063 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.596355 644063 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc00044c8a0 11 D0713 05:18:03.596364 644063 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:03.600215 644063 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.600242 644063 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc00044c8a0 12 D0713 05:18:03.600260 644063 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:03.600344 644063 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.600363 644063 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc00044c8a0 13 D0713 05:18:03.600377 644063 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:03.600450 644063 task_signals.go:470] [ 767: 767] Notified of signal 23 D0713 05:18:03.600531 644063 task_signals.go:220] [ 767: 767] Signal 23: delivering to handler D0713 05:18:03.606742 644063 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.606793 644063 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc00044c8a0 14 D0713 05:18:03.606806 644063 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:03.606876 644063 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.606925 644063 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.606935 644063 task_signals.go:204] [ 767: 770] Signal 767, PID: 770, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.606930 644063 task_signals.go:204] [ 767: 769] Signal 767, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.606951 644063 task_signals.go:204] [ 767: 771] Signal 767, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.606958 644063 task_signals.go:204] [ 767: 768] Signal 767, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.606961 644063 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.606996 644063 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.607026 644063 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.607032 644063 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.607066 644063 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.607073 644063 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.607080 644063 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.607094 644063 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.607097 644063 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.607112 644063 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.608462 644063 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.608507 644063 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.608525 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.608564 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.608587 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.608737 644063 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.609508 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.610757 644063 syscalls.go:262] [ 772: 772] Allocating stack with size of 8388608 bytes D0713 05:18:03.610858 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.612263 644063 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.612304 644063 usertrap_amd64.go:106] [ 772: 772] Map a usertrap vma at 67000 D0713 05:18:03.612394 644063 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0012b7e60 1 D0713 05:18:03.612438 644063 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:03.612844 644063 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.612871 644063 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0012b7e60 2 D0713 05:18:03.612879 644063 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:03.613483 644063 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.613511 644063 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0012b7e60 3 D0713 05:18:03.613522 644063 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:03.619192 644063 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.619229 644063 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0012b7e60 4 D0713 05:18:03.619243 644063 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:03.620565 644063 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.620609 644063 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0012b7e60 5 D0713 05:18:03.620625 644063 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:03.620684 644063 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.620696 644063 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0012b7e60 6 D0713 05:18:03.620707 644063 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:03.621424 644063 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.621456 644063 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0012b7e60 7 D0713 05:18:03.621477 644063 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:03.621766 644063 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.621784 644063 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc0012b7e60 8 D0713 05:18:03.621796 644063 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:03.622097 644063 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.622115 644063 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc0012b7e60 9 D0713 05:18:03.622130 644063 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:03.622147 644063 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.622153 644063 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0012b7e60 10 D0713 05:18:03.622160 644063 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:03.630158 644063 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.630187 644063 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0012b7e60 11 D0713 05:18:03.630197 644063 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:03.633654 644063 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.633710 644063 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc0012b7e60 12 D0713 05:18:03.633729 644063 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:03.633957 644063 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.633999 644063 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc0012b7e60 13 D0713 05:18:03.634017 644063 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) executing program D0713 05:18:03.634114 644063 task_signals.go:470] [ 772: 772] Notified of signal 23 D0713 05:18:03.634226 644063 task_signals.go:220] [ 772: 772] Signal 23: delivering to handler D0713 05:18:03.640701 644063 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.640739 644063 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0012b7e60 14 D0713 05:18:03.640753 644063 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:03.640838 644063 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.640866 644063 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.640899 644063 task_signals.go:204] [ 772: 773] Signal 772, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.640917 644063 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.640927 644063 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.640933 644063 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.640995 644063 task_signals.go:204] [ 772: 775] Signal 772, PID: 775, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.641022 644063 task_signals.go:204] [ 772: 774] Signal 772, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.641033 644063 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.641077 644063 task_signals.go:204] [ 772: 776] Signal 772, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.641073 644063 task_signals.go:204] [ 772: 777] Signal 772, PID: 777, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.641097 644063 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.641104 644063 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.641141 644063 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.641151 644063 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.641157 644063 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.641166 644063 task_exit.go:204] [ 772: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.641187 644063 task_exit.go:204] [ 772: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.641193 644063 task_exit.go:204] [ 772: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.641203 644063 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.642418 644063 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.642446 644063 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.642470 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.642507 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.642527 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.642587 644063 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.643218 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.644556 644063 syscalls.go:262] [ 778: 778] Allocating stack with size of 8388608 bytes D0713 05:18:03.644635 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.646273 644063 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.646310 644063 usertrap_amd64.go:106] [ 778: 778] Map a usertrap vma at 68000 D0713 05:18:03.646546 644063 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000c02ae0 1 D0713 05:18:03.646590 644063 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:03.647036 644063 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.647071 644063 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000c02ae0 2 D0713 05:18:03.647082 644063 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:03.647797 644063 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.647826 644063 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000c02ae0 3 D0713 05:18:03.647836 644063 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:03.653244 644063 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.653282 644063 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000c02ae0 4 D0713 05:18:03.653295 644063 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:03.654666 644063 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.654698 644063 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000c02ae0 5 D0713 05:18:03.654712 644063 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:03.654764 644063 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.654768 644063 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000c02ae0 6 D0713 05:18:03.654773 644063 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:03.655027 644063 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.655058 644063 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000c02ae0 7 D0713 05:18:03.655069 644063 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:03.655372 644063 usertrap_amd64.go:212] [ 778: 780] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.655406 644063 usertrap_amd64.go:122] [ 778: 780] Allocate a new trap: 0xc000c02ae0 8 D0713 05:18:03.655418 644063 usertrap_amd64.go:225] [ 778: 780] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:03.655547 644063 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.655572 644063 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000c02ae0 9 D0713 05:18:03.655583 644063 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:03.655757 644063 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:03.655777 644063 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc000c02ae0 10 D0713 05:18:03.655813 644063 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b6e0 trap addr 68320 ([184 24 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:03.655879 644063 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.655899 644063 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc000c02ae0 11 D0713 05:18:03.655906 644063 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46af76 trap addr 68370 ([184 35 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:03.663914 644063 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.663945 644063 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000c02ae0 12 D0713 05:18:03.663963 644063 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:03.666952 644063 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.666993 644063 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc000c02ae0 13 D0713 05:18:03.667009 644063 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:03.667049 644063 usertrap_amd64.go:212] [ 778: 779] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.667066 644063 usertrap_amd64.go:122] [ 778: 779] Allocate a new trap: 0xc000c02ae0 14 D0713 05:18:03.667081 644063 usertrap_amd64.go:225] [ 778: 779] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:03.667205 644063 task_signals.go:470] [ 778: 778] Notified of signal 23 D0713 05:18:03.667368 644063 task_signals.go:220] [ 778: 778] Signal 23: delivering to handler D0713 05:18:03.679098 644063 task_signals.go:470] [ 778: 778] Notified of signal 23 D0713 05:18:03.679254 644063 task_signals.go:220] [ 778: 778] Signal 23: delivering to handler D0713 05:18:03.679702 644063 usertrap_amd64.go:212] [ 778: 778] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.679739 644063 usertrap_amd64.go:122] [ 778: 778] Allocate a new trap: 0xc000c02ae0 15 D0713 05:18:03.679759 644063 usertrap_amd64.go:225] [ 778: 778] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 05:18:03.679830 644063 task_exit.go:204] [ 778: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.679852 644063 task_exit.go:204] [ 778: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.679876 644063 task_signals.go:204] [ 778: 781] Signal 778, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.679877 644063 task_signals.go:204] [ 778: 780] Signal 778, PID: 780, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.679893 644063 task_exit.go:204] [ 778: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.679893 644063 task_signals.go:204] [ 778: 779] Signal 778, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.679912 644063 task_exit.go:204] [ 778: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.679921 644063 task_exit.go:204] [ 778: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.679936 644063 task_exit.go:204] [ 778: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.679942 644063 task_exit.go:204] [ 778: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.679958 644063 task_exit.go:204] [ 778: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.679966 644063 task_exit.go:204] [ 778: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.679972 644063 task_exit.go:204] [ 778: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.679977 644063 task_exit.go:204] [ 778: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.679991 644063 task_signals.go:204] [ 778: 782] Signal 778, PID: 782, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.680004 644063 task_exit.go:204] [ 778: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.681234 644063 task_exit.go:204] [ 778: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.681277 644063 task_exit.go:204] [ 778: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.681296 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.681334 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.681355 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.681615 644063 task_exit.go:204] [ 778: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.682386 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.683794 644063 syscalls.go:262] [ 783: 783] Allocating stack with size of 8388608 bytes D0713 05:18:03.683891 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.686255 644063 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.686302 644063 usertrap_amd64.go:106] [ 783: 783] Map a usertrap vma at 68000 D0713 05:18:03.686395 644063 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000c02b40 1 D0713 05:18:03.686418 644063 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:03.686653 644063 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.686675 644063 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000c02b40 2 D0713 05:18:03.686685 644063 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:03.687023 644063 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.687047 644063 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000c02b40 3 D0713 05:18:03.687057 644063 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:03.692615 644063 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.692651 644063 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000c02b40 4 D0713 05:18:03.692665 644063 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:03.693985 644063 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.694014 644063 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000c02b40 5 D0713 05:18:03.694026 644063 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:03.694062 644063 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.694068 644063 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000c02b40 6 D0713 05:18:03.694075 644063 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:03.694553 644063 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.694585 644063 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000c02b40 7 D0713 05:18:03.694596 644063 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:03.694945 644063 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.694976 644063 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc000c02b40 8 D0713 05:18:03.694991 644063 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:03.695177 644063 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.695193 644063 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc000c02b40 9 D0713 05:18:03.695203 644063 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:03.695505 644063 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.695519 644063 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000c02b40 10 D0713 05:18:03.695528 644063 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:03.702323 644063 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.702356 644063 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000c02b40 11 D0713 05:18:03.702367 644063 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:03.705878 644063 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.706014 644063 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc000c02b40 12 D0713 05:18:03.706045 644063 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:03.706063 644063 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.706105 644063 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc000c02b40 13 D0713 05:18:03.706130 644063 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:03.706231 644063 task_signals.go:470] [ 783: 783] Notified of signal 23 D0713 05:18:03.706321 644063 task_signals.go:220] [ 783: 783] Signal 23: delivering to handler D0713 05:18:03.712600 644063 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.712632 644063 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc000c02b40 14 D0713 05:18:03.712642 644063 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:03.712706 644063 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.712732 644063 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.712763 644063 task_signals.go:204] [ 783: 784] Signal 783, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.712779 644063 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.712784 644063 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.712792 644063 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.712806 644063 task_signals.go:204] [ 783: 785] Signal 783, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.712818 644063 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.712822 644063 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.712825 644063 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.712840 644063 task_signals.go:204] [ 783: 786] Signal 783, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.712851 644063 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.712855 644063 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.712859 644063 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.712868 644063 task_signals.go:204] [ 783: 787] Signal 783, PID: 787, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.712879 644063 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.713948 644063 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.713965 644063 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.713987 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.714026 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.714035 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.714203 644063 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.714782 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.715899 644063 syscalls.go:262] [ 788: 788] Allocating stack with size of 8388608 bytes D0713 05:18:03.716052 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.717567 644063 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.717609 644063 usertrap_amd64.go:106] [ 788: 788] Map a usertrap vma at 60000 D0713 05:18:03.717701 644063 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000c02fc0 1 D0713 05:18:03.717743 644063 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:03.718020 644063 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.718035 644063 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000c02fc0 2 D0713 05:18:03.718044 644063 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:03.718827 644063 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.718854 644063 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000c02fc0 3 D0713 05:18:03.718865 644063 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:03.725787 644063 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.725813 644063 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000c02fc0 4 D0713 05:18:03.725824 644063 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:03.726969 644063 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.727006 644063 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000c02fc0 5 D0713 05:18:03.727026 644063 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:03.727087 644063 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.727106 644063 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000c02fc0 6 D0713 05:18:03.727114 644063 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:03.727429 644063 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.727452 644063 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000c02fc0 7 D0713 05:18:03.727462 644063 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:03.727625 644063 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.727649 644063 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc000c02fc0 8 D0713 05:18:03.727659 644063 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:03.727837 644063 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.727915 644063 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000c02fc0 9 D0713 05:18:03.727941 644063 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:03.727971 644063 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.727987 644063 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc000c02fc0 10 D0713 05:18:03.727996 644063 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:03.735823 644063 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.735864 644063 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000c02fc0 11 D0713 05:18:03.735878 644063 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:03.740532 644063 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.740572 644063 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc000c02fc0 12 D0713 05:18:03.740588 644063 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:03.740661 644063 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.740687 644063 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc000c02fc0 13 D0713 05:18:03.740703 644063 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:03.740783 644063 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:03.740811 644063 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000c02fc0 14 D0713 05:18:03.740822 644063 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b6e0 trap addr 60460 ([184 24 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:03.740845 644063 task_signals.go:470] [ 788: 788] Notified of signal 23 D0713 05:18:03.740885 644063 task_signals.go:220] [ 788: 788] Signal 23: delivering to handler D0713 05:18:03.746653 644063 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.746691 644063 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc000c02fc0 15 D0713 05:18:03.746707 644063 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 05:18:03.746755 644063 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.746788 644063 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.746793 644063 task_signals.go:204] [ 788: 790] Signal 788, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.746831 644063 task_signals.go:204] [ 788: 791] Signal 788, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.746814 644063 task_signals.go:204] [ 788: 789] Signal 788, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.746837 644063 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.746812 644063 task_signals.go:204] [ 788: 792] Signal 788, PID: 792, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.746855 644063 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.746847 644063 task_signals.go:204] [ 788: 793] Signal 788, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.746863 644063 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.746873 644063 task_exit.go:204] [ 788: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.746902 644063 task_exit.go:204] [ 788: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.746921 644063 task_exit.go:204] [ 788: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.746942 644063 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.746962 644063 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.746975 644063 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.746981 644063 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.746991 644063 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.747043 644063 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.747073 644063 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.748099 644063 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.748125 644063 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.748139 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.750532 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.750609 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.750840 644063 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.753851 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.755333 644063 syscalls.go:262] [ 794: 794] Allocating stack with size of 8388608 bytes D0713 05:18:03.755433 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.761570 644063 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.761635 644063 usertrap_amd64.go:106] [ 794: 794] Map a usertrap vma at 67000 D0713 05:18:03.761747 644063 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0009a21e0 1 D0713 05:18:03.761772 644063 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:03.762110 644063 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.762138 644063 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0009a21e0 2 D0713 05:18:03.762146 644063 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:03.762639 644063 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.762677 644063 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0009a21e0 3 D0713 05:18:03.762688 644063 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:03.769407 644063 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.769452 644063 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0009a21e0 4 D0713 05:18:03.769466 644063 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:03.770648 644063 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.770681 644063 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0009a21e0 5 D0713 05:18:03.770695 644063 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:03.770750 644063 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.770758 644063 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0009a21e0 6 D0713 05:18:03.770767 644063 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:03.771311 644063 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.771331 644063 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0009a21e0 7 D0713 05:18:03.771339 644063 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:03.771509 644063 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.771530 644063 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc0009a21e0 8 D0713 05:18:03.771542 644063 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:03.771831 644063 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.771841 644063 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc0009a21e0 9 D0713 05:18:03.771849 644063 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:03.771948 644063 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.771972 644063 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0009a21e0 10 D0713 05:18:03.771983 644063 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:03.772637 644063 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.772662 644063 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc0009a21e0 11 D0713 05:18:03.772674 644063 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:03.772705 644063 usertrap_amd64.go:212] [ 794: 795] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.772722 644063 usertrap_amd64.go:122] [ 794: 795] Allocate a new trap: 0xc0009a21e0 12 D0713 05:18:03.772730 644063 usertrap_amd64.go:225] [ 794: 795] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:03.772748 644063 task_signals.go:470] [ 794: 794] Notified of signal 23 D0713 05:18:03.772776 644063 task_signals.go:220] [ 794: 794] Signal 23: delivering to handler D0713 05:18:03.779797 644063 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.779834 644063 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0009a21e0 13 D0713 05:18:03.779846 644063 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:03.783660 644063 task_signals.go:470] [ 794: 794] Notified of signal 23 D0713 05:18:03.783886 644063 task_signals.go:220] [ 794: 794] Signal 23: delivering to handler D0713 05:18:03.791494 644063 usertrap_amd64.go:212] [ 794: 794] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.791602 644063 usertrap_amd64.go:122] [ 794: 794] Allocate a new trap: 0xc0009a21e0 14 D0713 05:18:03.791631 644063 usertrap_amd64.go:225] [ 794: 794] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:03.791677 644063 task_exit.go:204] [ 794: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.791712 644063 task_exit.go:204] [ 794: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.791746 644063 task_signals.go:204] [ 794: 796] Signal 794, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.791739 644063 task_signals.go:204] [ 794: 795] Signal 794, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.791764 644063 task_exit.go:204] [ 794: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.791751 644063 task_signals.go:204] [ 794: 797] Signal 794, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.791776 644063 task_exit.go:204] [ 794: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.791783 644063 task_exit.go:204] [ 794: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.791823 644063 task_signals.go:204] [ 794: 798] Signal 794, PID: 798, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.791840 644063 task_exit.go:204] [ 794: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.791849 644063 task_exit.go:204] [ 794: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.791905 644063 task_exit.go:204] [ 794: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.791923 644063 task_exit.go:204] [ 794: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.791947 644063 task_exit.go:204] [ 794: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.793034 644063 task_exit.go:204] [ 794: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.793054 644063 task_exit.go:204] [ 794: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.793372 644063 task_exit.go:204] [ 794: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.793391 644063 task_exit.go:204] [ 794: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.793407 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.793539 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.793563 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.793818 644063 task_exit.go:204] [ 794: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.794307 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.795750 644063 syscalls.go:262] [ 799: 799] Allocating stack with size of 8388608 bytes D0713 05:18:03.795849 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.797438 644063 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.797533 644063 usertrap_amd64.go:106] [ 799: 799] Map a usertrap vma at 67000 D0713 05:18:03.797669 644063 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2330 1 D0713 05:18:03.797743 644063 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:03.799175 644063 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.799204 644063 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2330 2 D0713 05:18:03.799217 644063 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:03.799877 644063 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.799901 644063 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2330 3 D0713 05:18:03.799914 644063 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:03.806746 644063 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.806784 644063 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2330 4 D0713 05:18:03.806822 644063 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:03.810424 644063 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.810496 644063 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2330 5 D0713 05:18:03.810516 644063 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:03.810584 644063 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.810597 644063 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2330 6 D0713 05:18:03.810604 644063 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:03.810954 644063 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.810978 644063 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2330 7 D0713 05:18:03.810990 644063 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:03.811309 644063 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.811376 644063 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc0009a2330 8 D0713 05:18:03.811402 644063 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:03.811669 644063 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.811702 644063 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc0009a2330 9 D0713 05:18:03.811715 644063 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:03.811851 644063 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.811873 644063 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2330 10 D0713 05:18:03.811883 644063 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:03.822496 644063 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.822558 644063 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2330 11 D0713 05:18:03.822608 644063 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:03.822637 644063 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.822673 644063 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc0009a2330 12 D0713 05:18:03.822688 644063 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:03.822792 644063 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.822824 644063 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc0009a2330 13 D0713 05:18:03.822837 644063 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:03.822879 644063 task_signals.go:470] [ 799: 799] Notified of signal 23 D0713 05:18:03.822932 644063 task_signals.go:220] [ 799: 799] Signal 23: delivering to handler D0713 05:18:03.833598 644063 task_signals.go:470] [ 799: 799] Notified of signal 23 D0713 05:18:03.833715 644063 task_signals.go:220] [ 799: 799] Signal 23: delivering to handler D0713 05:18:03.834270 644063 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.834301 644063 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc0009a2330 14 D0713 05:18:03.834315 644063 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:03.834450 644063 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.834491 644063 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.834527 644063 task_signals.go:204] [ 799: 802] Signal 799, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.834555 644063 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.834563 644063 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.834568 644063 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.834594 644063 task_signals.go:204] [ 799: 803] Signal 799, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.834603 644063 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.834609 644063 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.834614 644063 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.834625 644063 task_signals.go:204] [ 799: 804] Signal 799, PID: 804, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.834633 644063 task_exit.go:204] [ 799: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.834640 644063 task_exit.go:204] [ 799: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.834737 644063 task_exit.go:204] [ 799: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.834842 644063 task_signals.go:204] [ 799: 801] Signal 799, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.834857 644063 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.834876 644063 task_signals.go:204] [ 799: 800] Signal 799, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.834887 644063 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.834893 644063 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.834901 644063 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.836333 644063 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.836435 644063 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.836523 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.836567 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.836578 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.836885 644063 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.837093 644063 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 05:18:03.837169 644063 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 05:18:03.837738 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.839681 644063 syscalls.go:262] [ 805: 805] Allocating stack with size of 8388608 bytes D0713 05:18:03.839794 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.841060 644063 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.841104 644063 usertrap_amd64.go:106] [ 805: 805] Map a usertrap vma at 60000 D0713 05:18:03.841200 644063 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0002aed20 1 D0713 05:18:03.841236 644063 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:03.841810 644063 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.841830 644063 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0002aed20 2 D0713 05:18:03.841839 644063 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:03.842496 644063 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.842544 644063 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0002aed20 3 D0713 05:18:03.842563 644063 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:03.849705 644063 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.849775 644063 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0002aed20 4 D0713 05:18:03.849793 644063 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:03.851975 644063 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.852026 644063 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0002aed20 5 D0713 05:18:03.852043 644063 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:03.852106 644063 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.852120 644063 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0002aed20 6 D0713 05:18:03.852128 644063 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:03.852643 644063 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.852670 644063 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0002aed20 7 D0713 05:18:03.852680 644063 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:03.853256 644063 usertrap_amd64.go:212] [ 805: 806] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.853310 644063 usertrap_amd64.go:122] [ 805: 806] Allocate a new trap: 0xc0002aed20 8 D0713 05:18:03.853340 644063 usertrap_amd64.go:225] [ 805: 806] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:03.853553 644063 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.853591 644063 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0002aed20 9 D0713 05:18:03.853610 644063 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:03.853645 644063 usertrap_amd64.go:212] [ 805: 806] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.853664 644063 usertrap_amd64.go:122] [ 805: 806] Allocate a new trap: 0xc0002aed20 10 D0713 05:18:03.853802 644063 usertrap_amd64.go:225] [ 805: 806] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:03.863259 644063 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.863296 644063 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0002aed20 11 D0713 05:18:03.863307 644063 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:03.866218 644063 usertrap_amd64.go:212] [ 805: 806] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.866266 644063 usertrap_amd64.go:122] [ 805: 806] Allocate a new trap: 0xc0002aed20 12 D0713 05:18:03.866285 644063 usertrap_amd64.go:225] [ 805: 806] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:03.866328 644063 usertrap_amd64.go:212] [ 805: 806] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.866339 644063 usertrap_amd64.go:122] [ 805: 806] Allocate a new trap: 0xc0002aed20 13 D0713 05:18:03.866361 644063 usertrap_amd64.go:225] [ 805: 806] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:03.866490 644063 task_signals.go:470] [ 805: 805] Notified of signal 23 D0713 05:18:03.866691 644063 task_signals.go:220] [ 805: 805] Signal 23: delivering to handler D0713 05:18:03.876340 644063 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.876405 644063 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc0002aed20 14 D0713 05:18:03.876422 644063 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:03.876482 644063 task_exit.go:204] [ 805: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.876520 644063 task_exit.go:204] [ 805: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.876551 644063 task_signals.go:204] [ 805: 806] Signal 805, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.876598 644063 task_exit.go:204] [ 805: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.876609 644063 task_exit.go:204] [ 805: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.876616 644063 task_exit.go:204] [ 805: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.876641 644063 task_signals.go:204] [ 805: 808] Signal 805, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.876653 644063 task_signals.go:204] [ 805: 807] Signal 805, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.876664 644063 task_exit.go:204] [ 805: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.876681 644063 task_signals.go:204] [ 805: 809] Signal 805, PID: 809, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.876692 644063 task_exit.go:204] [ 805: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.876699 644063 task_exit.go:204] [ 805: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.876710 644063 task_exit.go:204] [ 805: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.876718 644063 task_exit.go:204] [ 805: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.876723 644063 task_exit.go:204] [ 805: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.876733 644063 task_exit.go:204] [ 805: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.877968 644063 task_exit.go:204] [ 805: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.878004 644063 task_exit.go:204] [ 805: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.878024 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.878054 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.878064 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.878171 644063 task_exit.go:204] [ 805: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.879004 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.880508 644063 syscalls.go:262] [ 810: 810] Allocating stack with size of 8388608 bytes D0713 05:18:03.880622 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.886434 644063 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.886480 644063 usertrap_amd64.go:106] [ 810: 810] Map a usertrap vma at 64000 D0713 05:18:03.886551 644063 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc000c03f80 1 D0713 05:18:03.886575 644063 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:03.887159 644063 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.887182 644063 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc000c03f80 2 D0713 05:18:03.887193 644063 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:03.888024 644063 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.888053 644063 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc000c03f80 3 D0713 05:18:03.888064 644063 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:03.896213 644063 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.896284 644063 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc000c03f80 4 D0713 05:18:03.896303 644063 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:03.897418 644063 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.897448 644063 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc000c03f80 5 D0713 05:18:03.897458 644063 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:03.897521 644063 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.897540 644063 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc000c03f80 6 D0713 05:18:03.897547 644063 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:03.897880 644063 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.897912 644063 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc000c03f80 7 D0713 05:18:03.897922 644063 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:03.898169 644063 usertrap_amd64.go:212] [ 810: 811] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.898202 644063 usertrap_amd64.go:122] [ 810: 811] Allocate a new trap: 0xc000c03f80 8 D0713 05:18:03.898212 644063 usertrap_amd64.go:225] [ 810: 811] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:03.898428 644063 usertrap_amd64.go:212] [ 810: 811] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.898452 644063 usertrap_amd64.go:122] [ 810: 811] Allocate a new trap: 0xc000c03f80 9 D0713 05:18:03.898467 644063 usertrap_amd64.go:225] [ 810: 811] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:03.898613 644063 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.898671 644063 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc000c03f80 10 D0713 05:18:03.898698 644063 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:03.906807 644063 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.906857 644063 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc000c03f80 11 D0713 05:18:03.906874 644063 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:03.909654 644063 usertrap_amd64.go:212] [ 810: 811] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.909694 644063 usertrap_amd64.go:122] [ 810: 811] Allocate a new trap: 0xc000c03f80 12 D0713 05:18:03.909709 644063 usertrap_amd64.go:225] [ 810: 811] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:03.909760 644063 usertrap_amd64.go:212] [ 810: 811] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.909779 644063 usertrap_amd64.go:122] [ 810: 811] Allocate a new trap: 0xc000c03f80 13 D0713 05:18:03.909788 644063 usertrap_amd64.go:225] [ 810: 811] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:03.909806 644063 task_signals.go:470] [ 810: 810] Notified of signal 23 D0713 05:18:03.909855 644063 task_signals.go:220] [ 810: 810] Signal 23: delivering to handler D0713 05:18:03.920662 644063 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.920714 644063 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc000c03f80 14 D0713 05:18:03.920729 644063 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:03.920803 644063 task_exit.go:204] [ 810: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.920837 644063 task_exit.go:204] [ 810: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.920865 644063 task_signals.go:204] [ 810: 812] Signal 810, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.920913 644063 task_exit.go:204] [ 810: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.920923 644063 task_exit.go:204] [ 810: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.920930 644063 task_exit.go:204] [ 810: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.920976 644063 task_signals.go:204] [ 810: 813] Signal 810, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.921001 644063 task_exit.go:204] [ 810: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.921010 644063 task_exit.go:204] [ 810: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.921020 644063 task_exit.go:204] [ 810: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.921037 644063 task_signals.go:204] [ 810: 814] Signal 810, PID: 814, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.921062 644063 task_exit.go:204] [ 810: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.921071 644063 task_exit.go:204] [ 810: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.921076 644063 task_exit.go:204] [ 810: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.921092 644063 task_signals.go:204] [ 810: 811] Signal 810, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.921103 644063 task_exit.go:204] [ 810: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.922315 644063 task_exit.go:204] [ 810: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.922342 644063 task_exit.go:204] [ 810: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.922358 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.922390 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.922400 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.922490 644063 task_exit.go:204] [ 810: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.923605 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.925341 644063 syscalls.go:262] [ 815: 815] Allocating stack with size of 8388608 bytes D0713 05:18:03.925491 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.928151 644063 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.928242 644063 usertrap_amd64.go:106] [ 815: 815] Map a usertrap vma at 6a000 D0713 05:18:03.928418 644063 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0005c60c0 1 D0713 05:18:03.928470 644063 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:03.929058 644063 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.929087 644063 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0005c60c0 2 D0713 05:18:03.929101 644063 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:03.929803 644063 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.929830 644063 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0005c60c0 3 D0713 05:18:03.929839 644063 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:03.938320 644063 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.938360 644063 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0005c60c0 4 D0713 05:18:03.938375 644063 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:03.940087 644063 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.940145 644063 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0005c60c0 5 D0713 05:18:03.940166 644063 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:03.940213 644063 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.940222 644063 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0005c60c0 6 D0713 05:18:03.940232 644063 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:03.940466 644063 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.940488 644063 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0005c60c0 7 D0713 05:18:03.940496 644063 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:03.940968 644063 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.941012 644063 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc0005c60c0 8 D0713 05:18:03.941027 644063 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:03.941191 644063 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.941222 644063 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0005c60c0 9 D0713 05:18:03.941238 644063 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:03.941263 644063 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.941272 644063 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc0005c60c0 10 D0713 05:18:03.941290 644063 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:03.941467 644063 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:03.941491 644063 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0005c60c0 11 D0713 05:18:03.941510 644063 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:03.952096 644063 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.952139 644063 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc0005c60c0 12 D0713 05:18:03.952159 644063 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:03.952233 644063 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.952244 644063 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc0005c60c0 13 D0713 05:18:03.952254 644063 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:03.952276 644063 task_signals.go:470] [ 815: 815] Notified of signal 23 D0713 05:18:03.952528 644063 task_signals.go:220] [ 815: 815] Signal 23: delivering to handler D0713 05:18:03.953653 644063 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.953692 644063 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0005c60c0 14 D0713 05:18:03.953707 644063 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46af29 trap addr 6a460 ([184 37 1 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:03.963856 644063 task_signals.go:470] [ 815: 815] Notified of signal 23 D0713 05:18:03.965750 644063 task_signals.go:220] [ 815: 815] Signal 23: delivering to handler I0713 05:18:03.966434 644063 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0713 05:18:03.966580 644063 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.966616 644063 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc0005c60c0 15 D0713 05:18:03.966638 644063 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 05:18:03.966723 644063 task_exit.go:204] [ 815: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.966755 644063 task_exit.go:204] [ 815: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.966809 644063 task_signals.go:204] [ 815: 816] Signal 815, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.966838 644063 task_exit.go:204] [ 815: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.966847 644063 task_exit.go:204] [ 815: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.966853 644063 task_exit.go:204] [ 815: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.966888 644063 task_signals.go:204] [ 815: 817] Signal 815, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.966913 644063 task_exit.go:204] [ 815: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.966922 644063 task_exit.go:204] [ 815: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.966930 644063 task_exit.go:204] [ 815: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.966950 644063 task_signals.go:204] [ 815: 818] Signal 815, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.966961 644063 task_exit.go:204] [ 815: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.966968 644063 task_exit.go:204] [ 815: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.966973 644063 task_exit.go:204] [ 815: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.966996 644063 task_signals.go:204] [ 815: 819] Signal 815, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.967018 644063 task_exit.go:204] [ 815: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.967025 644063 task_exit.go:204] [ 815: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.967020 644063 task_signals.go:204] [ 815: 820] Signal 815, PID: 820, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.967033 644063 task_exit.go:204] [ 815: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.967090 644063 task_exit.go:204] [ 815: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.968288 644063 task_exit.go:204] [ 815: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.968325 644063 task_exit.go:204] [ 815: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.968341 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.969078 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.969147 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.969274 644063 task_exit.go:204] [ 815: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.970695 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.972898 644063 syscalls.go:262] [ 821: 821] Allocating stack with size of 8388608 bytes D0713 05:18:03.973041 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.980002 644063 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.980062 644063 usertrap_amd64.go:106] [ 821: 821] Map a usertrap vma at 68000 D0713 05:18:03.980148 644063 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0005c6330 1 D0713 05:18:03.980176 644063 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:03.981182 644063 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.981222 644063 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0005c6330 2 D0713 05:18:03.981238 644063 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:03.982682 644063 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.982787 644063 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0005c6330 3 D0713 05:18:03.982806 644063 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:03.993689 644063 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.993758 644063 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0005c6330 4 D0713 05:18:03.993775 644063 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:03.994968 644063 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.994996 644063 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0005c6330 5 D0713 05:18:03.995010 644063 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:03.995082 644063 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.995090 644063 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0005c6330 6 D0713 05:18:03.995099 644063 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:03.995689 644063 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.995731 644063 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0005c6330 7 D0713 05:18:03.995747 644063 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:03.996014 644063 usertrap_amd64.go:212] [ 821: 822] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.996085 644063 usertrap_amd64.go:122] [ 821: 822] Allocate a new trap: 0xc0005c6330 8 D0713 05:18:03.996110 644063 usertrap_amd64.go:225] [ 821: 822] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:03.996339 644063 usertrap_amd64.go:212] [ 821: 822] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.996366 644063 usertrap_amd64.go:122] [ 821: 822] Allocate a new trap: 0xc0005c6330 9 D0713 05:18:03.996379 644063 usertrap_amd64.go:225] [ 821: 822] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:03.996517 644063 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.996553 644063 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0005c6330 10 D0713 05:18:03.996576 644063 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:04.004670 644063 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.004721 644063 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0005c6330 11 D0713 05:18:04.004739 644063 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:04.007620 644063 usertrap_amd64.go:212] [ 821: 822] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.007654 644063 usertrap_amd64.go:122] [ 821: 822] Allocate a new trap: 0xc0005c6330 12 D0713 05:18:04.007674 644063 usertrap_amd64.go:225] [ 821: 822] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:04.007783 644063 usertrap_amd64.go:212] [ 821: 822] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.007837 644063 usertrap_amd64.go:122] [ 821: 822] Allocate a new trap: 0xc0005c6330 13 D0713 05:18:04.007852 644063 usertrap_amd64.go:225] [ 821: 822] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:04.007911 644063 task_signals.go:470] [ 821: 821] Notified of signal 23 D0713 05:18:04.007999 644063 task_signals.go:220] [ 821: 821] Signal 23: delivering to handler I0713 05:18:04.015755 644063 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0713 05:18:04.015843 644063 usertrap_amd64.go:212] [ 821: 821] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.015857 644063 usertrap_amd64.go:122] [ 821: 821] Allocate a new trap: 0xc0005c6330 14 D0713 05:18:04.015872 644063 usertrap_amd64.go:225] [ 821: 821] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:04.015947 644063 task_exit.go:204] [ 821: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.015986 644063 task_exit.go:204] [ 821: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.016020 644063 task_signals.go:204] [ 821: 824] Signal 821, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.016007 644063 task_signals.go:204] [ 821: 822] Signal 821, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.016050 644063 task_exit.go:204] [ 821: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.016070 644063 task_signals.go:204] [ 821: 823] Signal 821, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.016048 644063 task_signals.go:204] [ 821: 825] Signal 821, PID: 825, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.016096 644063 task_exit.go:204] [ 821: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.016111 644063 task_exit.go:204] [ 821: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.016125 644063 task_exit.go:204] [ 821: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.016141 644063 task_exit.go:204] [ 821: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.016147 644063 task_exit.go:204] [ 821: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.016156 644063 task_exit.go:204] [ 821: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.016202 644063 task_exit.go:204] [ 821: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.016217 644063 task_exit.go:204] [ 821: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.016229 644063 task_exit.go:204] [ 821: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.017609 644063 task_exit.go:204] [ 821: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.017638 644063 task_exit.go:204] [ 821: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.017660 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.017716 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.017735 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.017833 644063 task_exit.go:204] [ 821: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.018614 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.020320 644063 syscalls.go:262] [ 826: 826] Allocating stack with size of 8388608 bytes D0713 05:18:04.020447 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.021778 644063 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.021824 644063 usertrap_amd64.go:106] [ 826: 826] Map a usertrap vma at 69000 D0713 05:18:04.021924 644063 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc00044dd40 1 D0713 05:18:04.021950 644063 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:04.022369 644063 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.022470 644063 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc00044dd40 2 D0713 05:18:04.022491 644063 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:04.023269 644063 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.023341 644063 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc00044dd40 3 D0713 05:18:04.023369 644063 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:04.031242 644063 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.031285 644063 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc00044dd40 4 D0713 05:18:04.031299 644063 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:04.032557 644063 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.032595 644063 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc00044dd40 5 D0713 05:18:04.032608 644063 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:04.032701 644063 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.032721 644063 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc00044dd40 6 D0713 05:18:04.032729 644063 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:04.033038 644063 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.033059 644063 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc00044dd40 7 D0713 05:18:04.033067 644063 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:04.034499 644063 usertrap_amd64.go:212] [ 826: 827] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.034527 644063 usertrap_amd64.go:122] [ 826: 827] Allocate a new trap: 0xc00044dd40 8 D0713 05:18:04.034540 644063 usertrap_amd64.go:225] [ 826: 827] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:04.034621 644063 usertrap_amd64.go:212] [ 826: 827] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.034641 644063 usertrap_amd64.go:122] [ 826: 827] Allocate a new trap: 0xc00044dd40 9 D0713 05:18:04.034650 644063 usertrap_amd64.go:225] [ 826: 827] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:04.034749 644063 usertrap_amd64.go:212] [ 826: 827] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.034790 644063 usertrap_amd64.go:122] [ 826: 827] Allocate a new trap: 0xc00044dd40 10 D0713 05:18:04.034824 644063 usertrap_amd64.go:225] [ 826: 827] Apply the binary patch addr 46b020 trap addr 69320 ([184 39 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:04.034962 644063 usertrap_amd64.go:212] [ 826: 827] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.035007 644063 usertrap_amd64.go:122] [ 826: 827] Allocate a new trap: 0xc00044dd40 11 D0713 05:18:04.035037 644063 usertrap_amd64.go:225] [ 826: 827] Apply the binary patch addr 46b04f trap addr 69370 ([184 234 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:04.035101 644063 task_signals.go:470] [ 826: 826] Notified of signal 23 D0713 05:18:04.035263 644063 task_signals.go:220] [ 826: 826] Signal 23: delivering to handler D0713 05:18:04.035370 644063 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.035407 644063 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc00044dd40 12 D0713 05:18:04.035419 644063 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b57c trap addr 693c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:04.043057 644063 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.043084 644063 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc00044dd40 13 D0713 05:18:04.043098 644063 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:04.046270 644063 task_signals.go:470] [ 826: 826] Notified of signal 23 D0713 05:18:04.046319 644063 task_signals.go:179] [ 826: 826] Restarting syscall 202: interrupted by signal 23 D0713 05:18:04.046338 644063 task_signals.go:220] [ 826: 826] Signal 23: delivering to handler I0713 05:18:04.055823 644063 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0713 05:18:04.056008 644063 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.056036 644063 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc00044dd40 14 D0713 05:18:04.056056 644063 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:04.056153 644063 task_exit.go:204] [ 826: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.056194 644063 task_exit.go:204] [ 826: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.056229 644063 task_signals.go:204] [ 826: 829] Signal 826, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.056263 644063 task_exit.go:204] [ 826: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.056216 644063 task_signals.go:204] [ 826: 827] Signal 826, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.056290 644063 task_exit.go:204] [ 826: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.056300 644063 task_exit.go:204] [ 826: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.056275 644063 task_signals.go:204] [ 826: 828] Signal 826, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.056317 644063 task_exit.go:204] [ 826: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.056509 644063 task_signals.go:204] [ 826: 830] Signal 826, PID: 830, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.056550 644063 task_exit.go:204] [ 826: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.056560 644063 task_exit.go:204] [ 826: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.056582 644063 task_exit.go:204] [ 826: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.056613 644063 task_exit.go:204] [ 826: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.056620 644063 task_exit.go:204] [ 826: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.056632 644063 task_exit.go:204] [ 826: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.058060 644063 task_exit.go:204] [ 826: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.058201 644063 task_exit.go:204] [ 826: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.058227 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.058298 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.058320 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.058488 644063 task_exit.go:204] [ 826: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.058671 644063 task_signals.go:470] [ 6: 13] Notified of signal 23 D0713 05:18:04.058744 644063 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 05:18:04.059140 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.060808 644063 syscalls.go:262] [ 831: 831] Allocating stack with size of 8388608 bytes D0713 05:18:04.061002 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.062714 644063 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.062789 644063 usertrap_amd64.go:106] [ 831: 831] Map a usertrap vma at 61000 D0713 05:18:04.062908 644063 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc0005c6ed0 1 D0713 05:18:04.062973 644063 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:04.063576 644063 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.063621 644063 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc0005c6ed0 2 D0713 05:18:04.063640 644063 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:04.064483 644063 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.064510 644063 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc0005c6ed0 3 D0713 05:18:04.064523 644063 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:04.074778 644063 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.074818 644063 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc0005c6ed0 4 D0713 05:18:04.074835 644063 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:04.076741 644063 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.076770 644063 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc0005c6ed0 5 D0713 05:18:04.076786 644063 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:04.076846 644063 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.076864 644063 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc0005c6ed0 6 D0713 05:18:04.076872 644063 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:04.077645 644063 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.077695 644063 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc0005c6ed0 7 D0713 05:18:04.077714 644063 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:04.079790 644063 usertrap_amd64.go:212] [ 831: 832] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.079807 644063 usertrap_amd64.go:122] [ 831: 832] Allocate a new trap: 0xc0005c6ed0 8 D0713 05:18:04.079820 644063 usertrap_amd64.go:225] [ 831: 832] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:04.079892 644063 usertrap_amd64.go:212] [ 831: 832] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.079908 644063 usertrap_amd64.go:122] [ 831: 832] Allocate a new trap: 0xc0005c6ed0 9 D0713 05:18:04.079920 644063 usertrap_amd64.go:225] [ 831: 832] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:04.080077 644063 usertrap_amd64.go:212] [ 831: 832] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.080101 644063 usertrap_amd64.go:122] [ 831: 832] Allocate a new trap: 0xc0005c6ed0 10 D0713 05:18:04.080113 644063 usertrap_amd64.go:225] [ 831: 832] Apply the binary patch addr 46b020 trap addr 61320 ([184 39 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:04.080197 644063 usertrap_amd64.go:212] [ 831: 832] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.080208 644063 usertrap_amd64.go:122] [ 831: 832] Allocate a new trap: 0xc0005c6ed0 11 D0713 05:18:04.080218 644063 usertrap_amd64.go:225] [ 831: 832] Apply the binary patch addr 46b04f trap addr 61370 ([184 234 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:04.080236 644063 task_signals.go:470] [ 831: 831] Notified of signal 23 D0713 05:18:04.080285 644063 task_signals.go:220] [ 831: 831] Signal 23: delivering to handler D0713 05:18:04.080500 644063 task_signals.go:481] [ 831: 831] No task notified of signal 23 D0713 05:18:04.080602 644063 task_signals.go:220] [ 831: 831] Signal 23: delivering to handler D0713 05:18:04.080689 644063 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.080699 644063 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc0005c6ed0 12 D0713 05:18:04.080708 644063 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b57c trap addr 613c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:04.090097 644063 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.090143 644063 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc0005c6ed0 13 D0713 05:18:04.090161 644063 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:04.091209 644063 task_signals.go:470] [ 831: 831] Notified of signal 23 D0713 05:18:04.093233 644063 task_signals.go:220] [ 831: 831] Signal 23: delivering to handler D0713 05:18:04.093326 644063 task_signals.go:481] [ 831: 831] No task notified of signal 23 D0713 05:18:04.093345 644063 task_signals.go:220] [ 831: 831] Signal 23: delivering to handler D0713 05:18:04.104232 644063 task_signals.go:470] [ 831: 831] Notified of signal 23 D0713 05:18:04.105123 644063 task_signals.go:220] [ 831: 831] Signal 23: delivering to handler D0713 05:18:04.105896 644063 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.105943 644063 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc0005c6ed0 14 D0713 05:18:04.105966 644063 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:04.106071 644063 task_exit.go:204] [ 831: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.106111 644063 task_exit.go:204] [ 831: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.106142 644063 task_signals.go:204] [ 831: 832] Signal 831, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.106176 644063 task_exit.go:204] [ 831: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.106185 644063 task_exit.go:204] [ 831: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.106192 644063 task_exit.go:204] [ 831: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.106212 644063 task_signals.go:204] [ 831: 833] Signal 831, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.106231 644063 task_exit.go:204] [ 831: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.106238 644063 task_exit.go:204] [ 831: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.106243 644063 task_exit.go:204] [ 831: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.106264 644063 task_signals.go:204] [ 831: 834] Signal 831, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.106275 644063 task_exit.go:204] [ 831: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.106283 644063 task_exit.go:204] [ 831: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.106289 644063 task_exit.go:204] [ 831: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.106309 644063 task_signals.go:204] [ 831: 835] Signal 831, PID: 835, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.106359 644063 task_exit.go:204] [ 831: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.107752 644063 task_exit.go:204] [ 831: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.107799 644063 task_exit.go:204] [ 831: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.107825 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.107857 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.107868 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.107950 644063 task_exit.go:204] [ 831: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.108627 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.110167 644063 syscalls.go:262] [ 836: 836] Allocating stack with size of 8388608 bytes D0713 05:18:04.110324 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.112171 644063 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.112216 644063 usertrap_amd64.go:106] [ 836: 836] Map a usertrap vma at 61000 D0713 05:18:04.112311 644063 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc00169c6c0 1 D0713 05:18:04.112340 644063 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:04.114114 644063 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.114154 644063 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc00169c6c0 2 D0713 05:18:04.114173 644063 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:04.114893 644063 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.114935 644063 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc00169c6c0 3 D0713 05:18:04.114950 644063 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:04.123382 644063 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.123426 644063 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc00169c6c0 4 D0713 05:18:04.123443 644063 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:04.124778 644063 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.124813 644063 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc00169c6c0 5 D0713 05:18:04.124826 644063 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:04.124872 644063 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.124877 644063 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc00169c6c0 6 D0713 05:18:04.124883 644063 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:04.125216 644063 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.125238 644063 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc00169c6c0 7 D0713 05:18:04.125258 644063 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:04.125458 644063 usertrap_amd64.go:212] [ 836: 837] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.125479 644063 usertrap_amd64.go:122] [ 836: 837] Allocate a new trap: 0xc00169c6c0 8 D0713 05:18:04.125490 644063 usertrap_amd64.go:225] [ 836: 837] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:04.125763 644063 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.125782 644063 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc00169c6c0 9 D0713 05:18:04.125793 644063 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:04.125810 644063 usertrap_amd64.go:212] [ 836: 837] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.125816 644063 usertrap_amd64.go:122] [ 836: 837] Allocate a new trap: 0xc00169c6c0 10 D0713 05:18:04.125824 644063 usertrap_amd64.go:225] [ 836: 837] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:04.125965 644063 usertrap_amd64.go:212] [ 836: 839] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:04.125979 644063 usertrap_amd64.go:122] [ 836: 839] Allocate a new trap: 0xc00169c6c0 11 D0713 05:18:04.126004 644063 usertrap_amd64.go:225] [ 836: 839] Apply the binary patch addr 46b6e0 trap addr 61370 ([184 24 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:04.132744 644063 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.132764 644063 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc00169c6c0 12 D0713 05:18:04.132774 644063 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:04.136762 644063 usertrap_amd64.go:212] [ 836: 837] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.136795 644063 usertrap_amd64.go:122] [ 836: 837] Allocate a new trap: 0xc00169c6c0 13 D0713 05:18:04.136809 644063 usertrap_amd64.go:225] [ 836: 837] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:04.136877 644063 usertrap_amd64.go:212] [ 836: 837] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.136887 644063 usertrap_amd64.go:122] [ 836: 837] Allocate a new trap: 0xc00169c6c0 14 D0713 05:18:04.136896 644063 usertrap_amd64.go:225] [ 836: 837] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:04.136914 644063 task_signals.go:470] [ 836: 836] Notified of signal 23 D0713 05:18:04.136997 644063 task_signals.go:220] [ 836: 836] Signal 23: delivering to handler I0713 05:18:04.143908 644063 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0713 05:18:04.144035 644063 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.144057 644063 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc00169c6c0 15 D0713 05:18:04.144074 644063 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 05:18:04.144157 644063 task_exit.go:204] [ 836: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.144196 644063 task_exit.go:204] [ 836: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.144234 644063 task_signals.go:204] [ 836: 841] Signal 836, PID: 841, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.144225 644063 task_signals.go:204] [ 836: 840] Signal 836, PID: 840, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.144235 644063 task_signals.go:204] [ 836: 839] Signal 836, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.144251 644063 task_exit.go:204] [ 836: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.144283 644063 task_signals.go:204] [ 836: 838] Signal 836, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.144311 644063 task_exit.go:204] [ 836: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.144336 644063 task_signals.go:204] [ 836: 837] Signal 836, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.144373 644063 task_exit.go:204] [ 836: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.144389 644063 task_exit.go:204] [ 836: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.144407 644063 task_exit.go:204] [ 836: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.144437 644063 task_exit.go:204] [ 836: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.144449 644063 task_exit.go:204] [ 836: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.144475 644063 task_exit.go:204] [ 836: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.144515 644063 task_exit.go:204] [ 836: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.144524 644063 task_exit.go:204] [ 836: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.144540 644063 task_exit.go:204] [ 836: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.144554 644063 task_exit.go:204] [ 836: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.144568 644063 task_exit.go:204] [ 836: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.145921 644063 task_exit.go:204] [ 836: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.145941 644063 task_exit.go:204] [ 836: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.145964 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.146039 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.146054 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.146322 644063 task_exit.go:204] [ 836: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.147036 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.148448 644063 syscalls.go:262] [ 842: 842] Allocating stack with size of 8388608 bytes D0713 05:18:04.148586 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.149532 644063 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.149635 644063 usertrap_amd64.go:106] [ 842: 842] Map a usertrap vma at 65000 D0713 05:18:04.149891 644063 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc00169c900 1 D0713 05:18:04.149937 644063 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:04.150373 644063 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.150393 644063 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc00169c900 2 D0713 05:18:04.150406 644063 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:04.151262 644063 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.151302 644063 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc00169c900 3 D0713 05:18:04.151321 644063 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:04.158730 644063 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.158761 644063 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc00169c900 4 D0713 05:18:04.158774 644063 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:04.160160 644063 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.160205 644063 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc00169c900 5 D0713 05:18:04.160222 644063 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:04.160272 644063 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.160288 644063 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc00169c900 6 D0713 05:18:04.160295 644063 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:04.160625 644063 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.160647 644063 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc00169c900 7 D0713 05:18:04.160655 644063 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:04.160839 644063 usertrap_amd64.go:212] [ 842: 843] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.160864 644063 usertrap_amd64.go:122] [ 842: 843] Allocate a new trap: 0xc00169c900 8 D0713 05:18:04.160879 644063 usertrap_amd64.go:225] [ 842: 843] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:04.161143 644063 usertrap_amd64.go:212] [ 842: 843] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.161177 644063 usertrap_amd64.go:122] [ 842: 843] Allocate a new trap: 0xc00169c900 9 D0713 05:18:04.161191 644063 usertrap_amd64.go:225] [ 842: 843] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:04.161293 644063 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.161319 644063 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc00169c900 10 D0713 05:18:04.161330 644063 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:04.168789 644063 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.168830 644063 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc00169c900 11 D0713 05:18:04.168845 644063 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:04.172721 644063 usertrap_amd64.go:212] [ 842: 843] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.172756 644063 usertrap_amd64.go:122] [ 842: 843] Allocate a new trap: 0xc00169c900 12 D0713 05:18:04.172770 644063 usertrap_amd64.go:225] [ 842: 843] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:04.172874 644063 usertrap_amd64.go:212] [ 842: 843] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.172914 644063 usertrap_amd64.go:122] [ 842: 843] Allocate a new trap: 0xc00169c900 13 D0713 05:18:04.172926 644063 usertrap_amd64.go:225] [ 842: 843] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:04.172988 644063 task_signals.go:470] [ 842: 842] Notified of signal 23 D0713 05:18:04.173016 644063 task_signals.go:220] [ 842: 842] Signal 23: delivering to handler I0713 05:18:04.179394 644063 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0713 05:18:04.179533 644063 usertrap_amd64.go:212] [ 842: 842] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.179551 644063 usertrap_amd64.go:122] [ 842: 842] Allocate a new trap: 0xc00169c900 14 D0713 05:18:04.179566 644063 usertrap_amd64.go:225] [ 842: 842] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:04.179635 644063 task_exit.go:204] [ 842: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.179684 644063 task_exit.go:204] [ 842: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.179716 644063 task_signals.go:204] [ 842: 843] Signal 842, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.179757 644063 task_exit.go:204] [ 842: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.179769 644063 task_exit.go:204] [ 842: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.179776 644063 task_exit.go:204] [ 842: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.179795 644063 task_signals.go:204] [ 842: 844] Signal 842, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.179821 644063 task_exit.go:204] [ 842: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.179829 644063 task_exit.go:204] [ 842: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.179834 644063 task_exit.go:204] [ 842: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.179850 644063 task_signals.go:204] [ 842: 845] Signal 842, PID: 845, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.179859 644063 task_exit.go:204] [ 842: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.179865 644063 task_exit.go:204] [ 842: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.179870 644063 task_exit.go:204] [ 842: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.179888 644063 task_signals.go:204] [ 842: 846] Signal 842, PID: 846, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.179898 644063 task_exit.go:204] [ 842: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.181152 644063 task_exit.go:204] [ 842: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.181188 644063 task_exit.go:204] [ 842: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.181205 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.181233 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.181242 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.181590 644063 task_exit.go:204] [ 842: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.182460 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.183986 644063 syscalls.go:262] [ 847: 847] Allocating stack with size of 8388608 bytes D0713 05:18:04.184079 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.185189 644063 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.185224 644063 usertrap_amd64.go:106] [ 847: 847] Map a usertrap vma at 61000 D0713 05:18:04.185304 644063 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc0005c7470 1 D0713 05:18:04.185332 644063 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:04.185563 644063 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.185585 644063 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc0005c7470 2 D0713 05:18:04.185593 644063 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:04.186323 644063 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.186355 644063 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc0005c7470 3 D0713 05:18:04.186366 644063 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:04.194673 644063 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.194715 644063 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc0005c7470 4 D0713 05:18:04.194729 644063 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:04.196229 644063 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.196297 644063 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc0005c7470 5 D0713 05:18:04.196314 644063 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:04.196430 644063 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.196448 644063 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc0005c7470 6 D0713 05:18:04.196458 644063 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:04.197027 644063 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.197053 644063 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc0005c7470 7 D0713 05:18:04.197062 644063 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:04.197257 644063 usertrap_amd64.go:212] [ 847: 848] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.197286 644063 usertrap_amd64.go:122] [ 847: 848] Allocate a new trap: 0xc0005c7470 8 D0713 05:18:04.197298 644063 usertrap_amd64.go:225] [ 847: 848] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:04.197501 644063 usertrap_amd64.go:212] [ 847: 848] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:04.197541 644063 usertrap_amd64.go:122] [ 847: 848] Allocate a new trap: 0xc0005c7470 9 D0713 05:18:04.197552 644063 usertrap_amd64.go:225] [ 847: 848] Apply the binary patch addr 46b6e0 trap addr 612d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:04.197639 644063 usertrap_amd64.go:212] [ 847: 848] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.197659 644063 usertrap_amd64.go:122] [ 847: 848] Allocate a new trap: 0xc0005c7470 10 D0713 05:18:04.197674 644063 usertrap_amd64.go:225] [ 847: 848] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:04.198057 644063 usertrap_amd64.go:212] [ 847: 848] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.198143 644063 usertrap_amd64.go:122] [ 847: 848] Allocate a new trap: 0xc0005c7470 11 D0713 05:18:04.198216 644063 usertrap_amd64.go:225] [ 847: 848] Apply the binary patch addr 46af76 trap addr 61370 ([184 35 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:04.207250 644063 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.207292 644063 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc0005c7470 12 D0713 05:18:04.207308 644063 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:04.210017 644063 usertrap_amd64.go:212] [ 847: 848] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.210051 644063 usertrap_amd64.go:122] [ 847: 848] Allocate a new trap: 0xc0005c7470 13 D0713 05:18:04.210066 644063 usertrap_amd64.go:225] [ 847: 848] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:04.210147 644063 usertrap_amd64.go:212] [ 847: 848] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.210167 644063 usertrap_amd64.go:122] [ 847: 848] Allocate a new trap: 0xc0005c7470 14 D0713 05:18:04.210176 644063 usertrap_amd64.go:225] [ 847: 848] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:04.211923 644063 task_signals.go:470] [ 847: 847] Notified of signal 23 D0713 05:18:04.212100 644063 task_signals.go:220] [ 847: 847] Signal 23: delivering to handler D0713 05:18:04.218829 644063 usertrap_amd64.go:212] [ 847: 847] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.218863 644063 usertrap_amd64.go:122] [ 847: 847] Allocate a new trap: 0xc0005c7470 15 D0713 05:18:04.218878 644063 usertrap_amd64.go:225] [ 847: 847] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 05:18:04.218938 644063 task_exit.go:204] [ 847: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.218985 644063 task_exit.go:204] [ 847: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.219025 644063 task_signals.go:204] [ 847: 849] Signal 847, PID: 849, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.219052 644063 task_exit.go:204] [ 847: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.219062 644063 task_exit.go:204] [ 847: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.219069 644063 task_exit.go:204] [ 847: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.219087 644063 task_signals.go:204] [ 847: 850] Signal 847, PID: 850, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.219109 644063 task_exit.go:204] [ 847: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.219133 644063 task_exit.go:204] [ 847: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.219140 644063 task_exit.go:204] [ 847: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.219168 644063 task_signals.go:204] [ 847: 851] Signal 847, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.219190 644063 task_exit.go:204] [ 847: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.219197 644063 task_exit.go:204] [ 847: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.219212 644063 task_exit.go:204] [ 847: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.219227 644063 task_signals.go:204] [ 847: 852] Signal 847, PID: 852, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.219240 644063 task_exit.go:204] [ 847: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.219248 644063 task_exit.go:204] [ 847: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.219254 644063 task_exit.go:204] [ 847: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.219300 644063 task_signals.go:204] [ 847: 848] Signal 847, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.219323 644063 task_exit.go:204] [ 847: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.220710 644063 task_exit.go:204] [ 847: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.220741 644063 task_exit.go:204] [ 847: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.220755 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.221883 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.221947 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.222175 644063 task_exit.go:204] [ 847: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.224507 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.225938 644063 syscalls.go:262] [ 853: 853] Allocating stack with size of 8388608 bytes D0713 05:18:04.226145 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.227791 644063 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.227840 644063 usertrap_amd64.go:106] [ 853: 853] Map a usertrap vma at 60000 D0713 05:18:04.227958 644063 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc0010becc0 1 D0713 05:18:04.228005 644063 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:04.228677 644063 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.228693 644063 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc0010becc0 2 D0713 05:18:04.228704 644063 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:04.229661 644063 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.229694 644063 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc0010becc0 3 D0713 05:18:04.229708 644063 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:04.236620 644063 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.236654 644063 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc0010becc0 4 D0713 05:18:04.236664 644063 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:04.237932 644063 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.237987 644063 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc0010becc0 5 D0713 05:18:04.238036 644063 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:04.238095 644063 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.238112 644063 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc0010becc0 6 D0713 05:18:04.238122 644063 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:04.238397 644063 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.238422 644063 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc0010becc0 7 D0713 05:18:04.238432 644063 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:04.238642 644063 usertrap_amd64.go:212] [ 853: 854] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.238673 644063 usertrap_amd64.go:122] [ 853: 854] Allocate a new trap: 0xc0010becc0 8 D0713 05:18:04.238688 644063 usertrap_amd64.go:225] [ 853: 854] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:04.238852 644063 usertrap_amd64.go:212] [ 853: 854] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:04.238862 644063 usertrap_amd64.go:122] [ 853: 854] Allocate a new trap: 0xc0010becc0 9 D0713 05:18:04.238870 644063 usertrap_amd64.go:225] [ 853: 854] Apply the binary patch addr 46b6e0 trap addr 602d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:04.238899 644063 usertrap_amd64.go:212] [ 853: 854] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.238905 644063 usertrap_amd64.go:122] [ 853: 854] Allocate a new trap: 0xc0010becc0 10 D0713 05:18:04.238912 644063 usertrap_amd64.go:225] [ 853: 854] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:04.239061 644063 usertrap_amd64.go:212] [ 853: 854] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.239094 644063 usertrap_amd64.go:122] [ 853: 854] Allocate a new trap: 0xc0010becc0 11 D0713 05:18:04.239109 644063 usertrap_amd64.go:225] [ 853: 854] Apply the binary patch addr 46af76 trap addr 60370 ([184 35 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:04.247222 644063 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.247288 644063 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc0010becc0 12 D0713 05:18:04.247302 644063 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:04.249660 644063 usertrap_amd64.go:212] [ 853: 854] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.249686 644063 usertrap_amd64.go:122] [ 853: 854] Allocate a new trap: 0xc0010becc0 13 D0713 05:18:04.249700 644063 usertrap_amd64.go:225] [ 853: 854] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:04.249761 644063 usertrap_amd64.go:212] [ 853: 854] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.249784 644063 usertrap_amd64.go:122] [ 853: 854] Allocate a new trap: 0xc0010becc0 14 D0713 05:18:04.249798 644063 usertrap_amd64.go:225] [ 853: 854] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:04.249885 644063 task_signals.go:470] [ 853: 853] Notified of signal 23 D0713 05:18:04.249969 644063 task_signals.go:220] [ 853: 853] Signal 23: delivering to handler I0713 05:18:04.257725 644063 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0713 05:18:04.257815 644063 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.257826 644063 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc0010becc0 15 D0713 05:18:04.257838 644063 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 05:18:04.257919 644063 task_exit.go:204] [ 853: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.257958 644063 task_exit.go:204] [ 853: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.257985 644063 task_signals.go:204] [ 853: 856] Signal 853, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.257974 644063 task_signals.go:204] [ 853: 854] Signal 853, PID: 854, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.257999 644063 task_exit.go:204] [ 853: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.258008 644063 task_signals.go:204] [ 853: 855] Signal 853, PID: 855, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.258019 644063 task_signals.go:204] [ 853: 857] Signal 853, PID: 857, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.258037 644063 task_exit.go:204] [ 853: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.258055 644063 task_exit.go:204] [ 853: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.258101 644063 task_exit.go:204] [ 853: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.258124 644063 task_exit.go:204] [ 853: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.258136 644063 task_exit.go:204] [ 853: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.258142 644063 task_exit.go:204] [ 853: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.258152 644063 task_exit.go:204] [ 853: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.258253 644063 task_exit.go:204] [ 853: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.258278 644063 task_exit.go:204] [ 853: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.259353 644063 task_exit.go:204] [ 853: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.259369 644063 task_exit.go:204] [ 853: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.259382 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.259566 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.259584 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.259760 644063 task_exit.go:204] [ 853: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.260572 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.261941 644063 syscalls.go:262] [ 858: 858] Allocating stack with size of 8388608 bytes D0713 05:18:04.262066 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.263211 644063 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.263255 644063 usertrap_amd64.go:106] [ 858: 858] Map a usertrap vma at 68000 D0713 05:18:04.263379 644063 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc00057b290 1 D0713 05:18:04.263421 644063 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:04.263745 644063 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.263762 644063 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc00057b290 2 D0713 05:18:04.263769 644063 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:04.264671 644063 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.264694 644063 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc00057b290 3 D0713 05:18:04.264702 644063 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:04.271761 644063 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.271792 644063 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc00057b290 4 D0713 05:18:04.271802 644063 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:04.272847 644063 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.272903 644063 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc00057b290 5 D0713 05:18:04.272916 644063 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:04.273009 644063 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.273021 644063 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc00057b290 6 D0713 05:18:04.273030 644063 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:04.273244 644063 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.273264 644063 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc00057b290 7 D0713 05:18:04.273269 644063 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:04.273382 644063 usertrap_amd64.go:212] [ 858: 859] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.273393 644063 usertrap_amd64.go:122] [ 858: 859] Allocate a new trap: 0xc00057b290 8 D0713 05:18:04.273421 644063 usertrap_amd64.go:225] [ 858: 859] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:04.273854 644063 usertrap_amd64.go:212] [ 858: 859] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.273882 644063 usertrap_amd64.go:122] [ 858: 859] Allocate a new trap: 0xc00057b290 9 D0713 05:18:04.273894 644063 usertrap_amd64.go:225] [ 858: 859] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:04.273948 644063 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.273963 644063 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc00057b290 10 D0713 05:18:04.273972 644063 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:04.281350 644063 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.281387 644063 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc00057b290 11 D0713 05:18:04.281400 644063 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:04.285001 644063 usertrap_amd64.go:212] [ 858: 859] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.285036 644063 usertrap_amd64.go:122] [ 858: 859] Allocate a new trap: 0xc00057b290 12 D0713 05:18:04.285049 644063 usertrap_amd64.go:225] [ 858: 859] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:04.285105 644063 usertrap_amd64.go:212] [ 858: 859] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.285124 644063 usertrap_amd64.go:122] [ 858: 859] Allocate a new trap: 0xc00057b290 13 D0713 05:18:04.285142 644063 usertrap_amd64.go:225] [ 858: 859] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:04.285187 644063 task_signals.go:470] [ 858: 858] Notified of signal 23 D0713 05:18:04.285254 644063 task_signals.go:220] [ 858: 858] Signal 23: delivering to handler I0713 05:18:04.291973 644063 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0713 05:18:04.292074 644063 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.292097 644063 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc00057b290 14 D0713 05:18:04.292108 644063 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:04.292165 644063 task_exit.go:204] [ 858: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.292190 644063 task_exit.go:204] [ 858: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.292213 644063 task_signals.go:204] [ 858: 861] Signal 858, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.292228 644063 task_exit.go:204] [ 858: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.292236 644063 task_exit.go:204] [ 858: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.292244 644063 task_exit.go:204] [ 858: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.292221 644063 task_signals.go:204] [ 858: 860] Signal 858, PID: 860, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.292272 644063 task_signals.go:204] [ 858: 859] Signal 858, PID: 859, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.292293 644063 task_exit.go:204] [ 858: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.292304 644063 task_signals.go:204] [ 858: 862] Signal 858, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.292319 644063 task_exit.go:204] [ 858: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.292332 644063 task_exit.go:204] [ 858: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.292343 644063 task_exit.go:204] [ 858: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.292353 644063 task_exit.go:204] [ 858: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.292368 644063 task_exit.go:204] [ 858: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.292375 644063 task_exit.go:204] [ 858: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.293599 644063 task_exit.go:204] [ 858: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.293621 644063 task_exit.go:204] [ 858: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.293635 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.293674 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.293696 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.293907 644063 task_exit.go:204] [ 858: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.294319 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.295610 644063 syscalls.go:262] [ 863: 863] Allocating stack with size of 8388608 bytes D0713 05:18:04.295701 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.296237 644063 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.296275 644063 usertrap_amd64.go:106] [ 863: 863] Map a usertrap vma at 69000 D0713 05:18:04.296371 644063 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc00057b350 1 D0713 05:18:04.296405 644063 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:04.297321 644063 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.297348 644063 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc00057b350 2 D0713 05:18:04.297359 644063 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:04.298019 644063 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.298057 644063 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc00057b350 3 D0713 05:18:04.298069 644063 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:04.305592 644063 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.305624 644063 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc00057b350 4 D0713 05:18:04.305637 644063 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:04.306858 644063 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.306894 644063 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc00057b350 5 D0713 05:18:04.306904 644063 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:04.307249 644063 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.307274 644063 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc00057b350 6 D0713 05:18:04.307286 644063 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:04.307736 644063 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.307769 644063 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc00057b350 7 D0713 05:18:04.307783 644063 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:04.307949 644063 usertrap_amd64.go:212] [ 863: 864] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.307970 644063 usertrap_amd64.go:122] [ 863: 864] Allocate a new trap: 0xc00057b350 8 D0713 05:18:04.307980 644063 usertrap_amd64.go:225] [ 863: 864] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:04.308177 644063 usertrap_amd64.go:212] [ 863: 864] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.308251 644063 usertrap_amd64.go:122] [ 863: 864] Allocate a new trap: 0xc00057b350 9 D0713 05:18:04.308266 644063 usertrap_amd64.go:225] [ 863: 864] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:04.308296 644063 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.308306 644063 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc00057b350 10 D0713 05:18:04.308314 644063 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:04.308372 644063 usertrap_amd64.go:212] [ 863: 866] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:04.308401 644063 usertrap_amd64.go:122] [ 863: 866] Allocate a new trap: 0xc00057b350 11 D0713 05:18:04.308413 644063 usertrap_amd64.go:225] [ 863: 866] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:04.315380 644063 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.315413 644063 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc00057b350 12 D0713 05:18:04.315426 644063 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:04.319163 644063 usertrap_amd64.go:212] [ 863: 864] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.319193 644063 usertrap_amd64.go:122] [ 863: 864] Allocate a new trap: 0xc00057b350 13 D0713 05:18:04.319205 644063 usertrap_amd64.go:225] [ 863: 864] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:04.319281 644063 usertrap_amd64.go:212] [ 863: 864] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.319299 644063 usertrap_amd64.go:122] [ 863: 864] Allocate a new trap: 0xc00057b350 14 D0713 05:18:04.319307 644063 usertrap_amd64.go:225] [ 863: 864] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:04.319352 644063 task_signals.go:470] [ 863: 863] Notified of signal 23 D0713 05:18:04.319441 644063 task_signals.go:220] [ 863: 863] Signal 23: delivering to handler D0713 05:18:04.325329 644063 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.325360 644063 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc00057b350 15 D0713 05:18:04.325373 644063 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 05:18:04.325452 644063 task_exit.go:204] [ 863: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.325476 644063 task_exit.go:204] [ 863: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.325503 644063 task_signals.go:204] [ 863: 866] Signal 863, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.325497 644063 task_signals.go:204] [ 863: 864] Signal 863, PID: 864, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.325524 644063 task_exit.go:204] [ 863: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.325554 644063 task_signals.go:204] [ 863: 867] Signal 863, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.325562 644063 task_signals.go:204] [ 863: 865] Signal 863, PID: 865, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.325574 644063 task_exit.go:204] [ 863: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.325585 644063 task_exit.go:204] [ 863: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.325612 644063 task_exit.go:204] [ 863: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.325634 644063 task_exit.go:204] [ 863: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.325641 644063 task_exit.go:204] [ 863: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.325652 644063 task_exit.go:204] [ 863: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.325661 644063 task_exit.go:204] [ 863: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.325666 644063 task_exit.go:204] [ 863: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.325677 644063 task_exit.go:204] [ 863: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.326785 644063 task_exit.go:204] [ 863: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.326824 644063 task_exit.go:204] [ 863: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.326839 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.326867 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.326894 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.326956 644063 task_exit.go:204] [ 863: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.327494 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.327625 644063 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 05:18:04.328875 644063 syscalls.go:262] [ 868: 868] Allocating stack with size of 8388608 bytes D0713 05:18:04.328999 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.329245 644063 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 05:18:04.330313 644063 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.330344 644063 usertrap_amd64.go:106] [ 868: 868] Map a usertrap vma at 6a000 D0713 05:18:04.330403 644063 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc0010bfaa0 1 D0713 05:18:04.330421 644063 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:04.330766 644063 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.330793 644063 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc0010bfaa0 2 D0713 05:18:04.330803 644063 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:04.331329 644063 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.331357 644063 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc0010bfaa0 3 D0713 05:18:04.331371 644063 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:04.336688 644063 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.336715 644063 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc0010bfaa0 4 D0713 05:18:04.336723 644063 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:04.337986 644063 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.338005 644063 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc0010bfaa0 5 D0713 05:18:04.338014 644063 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:04.338065 644063 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.338071 644063 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc0010bfaa0 6 D0713 05:18:04.338081 644063 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:04.338275 644063 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.338292 644063 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc0010bfaa0 7 D0713 05:18:04.338297 644063 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:04.338360 644063 usertrap_amd64.go:212] [ 868: 869] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.338373 644063 usertrap_amd64.go:122] [ 868: 869] Allocate a new trap: 0xc0010bfaa0 8 D0713 05:18:04.338378 644063 usertrap_amd64.go:225] [ 868: 869] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:04.338520 644063 usertrap_amd64.go:212] [ 868: 869] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.338546 644063 usertrap_amd64.go:122] [ 868: 869] Allocate a new trap: 0xc0010bfaa0 9 D0713 05:18:04.338555 644063 usertrap_amd64.go:225] [ 868: 869] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:04.338565 644063 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.338571 644063 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc0010bfaa0 10 D0713 05:18:04.338579 644063 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:04.339388 644063 usertrap_amd64.go:212] [ 868: 869] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.339421 644063 usertrap_amd64.go:122] [ 868: 869] Allocate a new trap: 0xc0010bfaa0 11 D0713 05:18:04.339431 644063 usertrap_amd64.go:225] [ 868: 869] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:04.339494 644063 usertrap_amd64.go:212] [ 868: 869] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.339510 644063 usertrap_amd64.go:122] [ 868: 869] Allocate a new trap: 0xc0010bfaa0 12 D0713 05:18:04.339523 644063 usertrap_amd64.go:225] [ 868: 869] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:04.339564 644063 task_signals.go:470] [ 868: 868] Notified of signal 23 D0713 05:18:04.339652 644063 task_signals.go:220] [ 868: 868] Signal 23: delivering to handler D0713 05:18:04.346083 644063 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.346108 644063 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc0010bfaa0 13 D0713 05:18:04.346116 644063 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:04.350312 644063 task_signals.go:470] [ 868: 868] Notified of signal 23 D0713 05:18:04.350376 644063 task_signals.go:220] [ 868: 868] Signal 23: delivering to handler D0713 05:18:04.358066 644063 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.358110 644063 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc0010bfaa0 14 D0713 05:18:04.358128 644063 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:04.358318 644063 task_exit.go:204] [ 868: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.358425 644063 task_signals.go:204] [ 868: 869] Signal 868, PID: 869, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.358465 644063 task_signals.go:204] [ 868: 873] Signal 868, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.358487 644063 task_signals.go:204] [ 868: 870] Signal 868, PID: 870, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.358465 644063 task_signals.go:204] [ 868: 872] Signal 868, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.358520 644063 task_signals.go:204] [ 868: 871] Signal 868, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.358532 644063 task_exit.go:204] [ 868: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.358555 644063 task_exit.go:204] [ 868: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.358580 644063 task_exit.go:204] [ 868: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.358589 644063 task_exit.go:204] [ 868: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.358602 644063 task_exit.go:204] [ 868: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.358617 644063 task_exit.go:204] [ 868: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.358622 644063 task_exit.go:204] [ 868: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.358637 644063 task_exit.go:204] [ 868: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.358659 644063 task_exit.go:204] [ 868: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.358666 644063 task_exit.go:204] [ 868: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.358697 644063 task_exit.go:204] [ 868: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.358712 644063 task_exit.go:204] [ 868: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.358720 644063 task_exit.go:204] [ 868: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.358732 644063 task_exit.go:204] [ 868: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.359820 644063 task_exit.go:204] [ 868: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.359856 644063 task_exit.go:204] [ 868: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.359878 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.359922 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.359934 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.360062 644063 task_exit.go:204] [ 868: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.360694 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.362265 644063 syscalls.go:262] [ 874: 874] Allocating stack with size of 8388608 bytes D0713 05:18:04.362351 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.364042 644063 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.364080 644063 usertrap_amd64.go:106] [ 874: 874] Map a usertrap vma at 69000 D0713 05:18:04.364153 644063 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc0005c76e0 1 D0713 05:18:04.364186 644063 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:04.364609 644063 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.364635 644063 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc0005c76e0 2 D0713 05:18:04.364644 644063 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:04.365405 644063 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.365421 644063 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc0005c76e0 3 D0713 05:18:04.365431 644063 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:04.372544 644063 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.372581 644063 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc0005c76e0 4 D0713 05:18:04.372594 644063 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:04.374190 644063 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.374267 644063 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc0005c76e0 5 D0713 05:18:04.374287 644063 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:04.374440 644063 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.374625 644063 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc0005c76e0 6 D0713 05:18:04.374668 644063 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:04.375062 644063 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.375088 644063 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc0005c76e0 7 D0713 05:18:04.375098 644063 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:04.375393 644063 usertrap_amd64.go:212] [ 874: 875] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.375429 644063 usertrap_amd64.go:122] [ 874: 875] Allocate a new trap: 0xc0005c76e0 8 D0713 05:18:04.375445 644063 usertrap_amd64.go:225] [ 874: 875] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:04.375596 644063 usertrap_amd64.go:212] [ 874: 875] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.375619 644063 usertrap_amd64.go:122] [ 874: 875] Allocate a new trap: 0xc0005c76e0 9 D0713 05:18:04.375634 644063 usertrap_amd64.go:225] [ 874: 875] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:04.376045 644063 usertrap_amd64.go:212] [ 874: 875] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.376074 644063 usertrap_amd64.go:122] [ 874: 875] Allocate a new trap: 0xc0005c76e0 10 D0713 05:18:04.376086 644063 usertrap_amd64.go:225] [ 874: 875] Apply the binary patch addr 46b020 trap addr 69320 ([184 39 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:04.376177 644063 usertrap_amd64.go:212] [ 874: 875] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.376188 644063 usertrap_amd64.go:122] [ 874: 875] Allocate a new trap: 0xc0005c76e0 11 D0713 05:18:04.376207 644063 usertrap_amd64.go:225] [ 874: 875] Apply the binary patch addr 46b04f trap addr 69370 ([184 234 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:04.376264 644063 task_signals.go:470] [ 874: 874] Notified of signal 23 D0713 05:18:04.376341 644063 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.376366 644063 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc0005c76e0 12 D0713 05:18:04.376376 644063 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b57c trap addr 693c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:04.376421 644063 task_signals.go:179] [ 874: 874] Restarting syscall 202: interrupted by signal 23 D0713 05:18:04.376445 644063 task_signals.go:220] [ 874: 874] Signal 23: delivering to handler D0713 05:18:04.385204 644063 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.385247 644063 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc0005c76e0 13 D0713 05:18:04.385263 644063 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:04.387148 644063 task_signals.go:470] [ 874: 874] Notified of signal 23 D0713 05:18:04.387928 644063 task_signals.go:220] [ 874: 874] Signal 23: delivering to handler D0713 05:18:04.398616 644063 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.398671 644063 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc0005c76e0 14 D0713 05:18:04.398686 644063 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:04.398738 644063 task_exit.go:204] [ 874: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.398772 644063 task_exit.go:204] [ 874: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.398795 644063 task_signals.go:204] [ 874: 878] Signal 874, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.398793 644063 task_signals.go:204] [ 874: 875] Signal 874, PID: 875, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.398806 644063 task_signals.go:204] [ 874: 876] Signal 874, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.398789 644063 task_signals.go:204] [ 874: 877] Signal 874, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.398808 644063 task_exit.go:204] [ 874: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.398893 644063 task_exit.go:204] [ 874: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.398921 644063 task_exit.go:204] [ 874: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.398934 644063 task_exit.go:204] [ 874: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.398949 644063 task_exit.go:204] [ 874: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.398964 644063 task_exit.go:204] [ 874: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.398975 644063 task_exit.go:204] [ 874: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.398997 644063 task_exit.go:204] [ 874: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.399017 644063 task_exit.go:204] [ 874: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.399029 644063 task_exit.go:204] [ 874: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.400376 644063 task_exit.go:204] [ 874: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.400415 644063 task_exit.go:204] [ 874: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.400431 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.400464 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.400489 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.400566 644063 task_exit.go:204] [ 874: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.401411 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.403154 644063 syscalls.go:262] [ 879: 879] Allocating stack with size of 8388608 bytes D0713 05:18:04.403420 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.404209 644063 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.404255 644063 usertrap_amd64.go:106] [ 879: 879] Map a usertrap vma at 69000 D0713 05:18:04.404351 644063 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc00169d590 1 D0713 05:18:04.404384 644063 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:04.404903 644063 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.404969 644063 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc00169d590 2 D0713 05:18:04.405008 644063 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:04.405677 644063 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.405705 644063 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc00169d590 3 D0713 05:18:04.405717 644063 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:04.413626 644063 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.413660 644063 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc00169d590 4 D0713 05:18:04.413671 644063 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:04.414683 644063 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.414714 644063 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc00169d590 5 D0713 05:18:04.414723 644063 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:04.414766 644063 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.414771 644063 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc00169d590 6 D0713 05:18:04.414777 644063 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:04.414914 644063 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.414931 644063 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc00169d590 7 D0713 05:18:04.414936 644063 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:04.415087 644063 usertrap_amd64.go:212] [ 879: 880] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.415132 644063 usertrap_amd64.go:122] [ 879: 880] Allocate a new trap: 0xc00169d590 8 D0713 05:18:04.415195 644063 usertrap_amd64.go:225] [ 879: 880] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:04.415252 644063 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.415279 644063 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc00169d590 9 D0713 05:18:04.415308 644063 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:04.415343 644063 usertrap_amd64.go:212] [ 879: 880] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.415362 644063 usertrap_amd64.go:122] [ 879: 880] Allocate a new trap: 0xc00169d590 10 D0713 05:18:04.415371 644063 usertrap_amd64.go:225] [ 879: 880] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:04.415445 644063 usertrap_amd64.go:212] [ 879: 882] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:04.415471 644063 usertrap_amd64.go:122] [ 879: 882] Allocate a new trap: 0xc00169d590 11 D0713 05:18:04.415477 644063 usertrap_amd64.go:225] [ 879: 882] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:04.422853 644063 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.422884 644063 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc00169d590 12 D0713 05:18:04.422899 644063 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:04.425584 644063 usertrap_amd64.go:212] [ 879: 880] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.425616 644063 usertrap_amd64.go:122] [ 879: 880] Allocate a new trap: 0xc00169d590 13 D0713 05:18:04.425628 644063 usertrap_amd64.go:225] [ 879: 880] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:04.425684 644063 usertrap_amd64.go:212] [ 879: 880] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.425708 644063 usertrap_amd64.go:122] [ 879: 880] Allocate a new trap: 0xc00169d590 14 D0713 05:18:04.425720 644063 usertrap_amd64.go:225] [ 879: 880] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:04.425799 644063 task_signals.go:470] [ 879: 879] Notified of signal 23 D0713 05:18:04.425906 644063 task_signals.go:220] [ 879: 879] Signal 23: delivering to handler D0713 05:18:04.432923 644063 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.432973 644063 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc00169d590 15 D0713 05:18:04.432989 644063 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 05:18:04.433120 644063 task_exit.go:204] [ 879: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.433161 644063 task_exit.go:204] [ 879: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.433192 644063 task_signals.go:204] [ 879: 882] Signal 879, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.433221 644063 task_exit.go:204] [ 879: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.433220 644063 task_signals.go:204] [ 879: 880] Signal 879, PID: 880, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.433233 644063 task_exit.go:204] [ 879: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.433184 644063 task_signals.go:204] [ 879: 881] Signal 879, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.433241 644063 task_exit.go:204] [ 879: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.433275 644063 task_signals.go:204] [ 879: 883] Signal 879, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.433297 644063 task_exit.go:204] [ 879: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.433307 644063 task_exit.go:204] [ 879: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.433313 644063 task_exit.go:204] [ 879: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.433325 644063 task_exit.go:204] [ 879: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.433346 644063 task_exit.go:204] [ 879: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.433352 644063 task_exit.go:204] [ 879: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.433363 644063 task_exit.go:204] [ 879: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.434457 644063 task_exit.go:204] [ 879: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.434488 644063 task_exit.go:204] [ 879: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.434503 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.434585 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.434668 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.434717 644063 task_exit.go:204] [ 879: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.434952 644063 task_signals.go:470] [ 6: 13] Notified of signal 23 D0713 05:18:04.434992 644063 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 05:18:04.435442 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.436921 644063 syscalls.go:262] [ 884: 884] Allocating stack with size of 8388608 bytes D0713 05:18:04.437208 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.438366 644063 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.438414 644063 usertrap_amd64.go:106] [ 884: 884] Map a usertrap vma at 62000 D0713 05:18:04.438490 644063 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc001b84780 1 D0713 05:18:04.438525 644063 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:04.439035 644063 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.439072 644063 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc001b84780 2 D0713 05:18:04.439084 644063 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:04.439683 644063 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.439710 644063 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc001b84780 3 D0713 05:18:04.439719 644063 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:04.447078 644063 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.447107 644063 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc001b84780 4 D0713 05:18:04.447123 644063 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:04.448422 644063 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.448474 644063 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc001b84780 5 D0713 05:18:04.448492 644063 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:04.448559 644063 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.448577 644063 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc001b84780 6 D0713 05:18:04.448586 644063 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:04.449186 644063 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.449316 644063 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc001b84780 7 D0713 05:18:04.449346 644063 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:04.449563 644063 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.449635 644063 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc001b84780 8 D0713 05:18:04.449647 644063 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:04.449844 644063 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.449972 644063 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc001b84780 9 D0713 05:18:04.450122 644063 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:04.450184 644063 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.450194 644063 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc001b84780 10 D0713 05:18:04.450207 644063 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:04.450303 644063 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.450338 644063 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc001b84780 11 D0713 05:18:04.450353 644063 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:04.450552 644063 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.450571 644063 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc001b84780 12 D0713 05:18:04.450581 644063 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:04.450609 644063 task_signals.go:470] [ 884: 887] Notified of signal 23 D0713 05:18:04.450717 644063 task_signals.go:220] [ 884: 887] Signal 23: delivering to handler D0713 05:18:04.450791 644063 task_signals.go:481] [ 884: 887] No task notified of signal 23 D0713 05:18:04.450817 644063 task_signals.go:220] [ 884: 887] Signal 23: delivering to handler D0713 05:18:04.459390 644063 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.459420 644063 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc001b84780 13 D0713 05:18:04.459434 644063 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:04.462510 644063 task_signals.go:470] [ 884: 884] Notified of signal 23 D0713 05:18:04.462582 644063 task_signals.go:220] [ 884: 884] Signal 23: delivering to handler D0713 05:18:04.471519 644063 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.471560 644063 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc001b84780 14 D0713 05:18:04.471576 644063 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:04.471660 644063 task_exit.go:204] [ 884: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.471691 644063 task_exit.go:204] [ 884: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.471729 644063 task_signals.go:204] [ 884: 886] Signal 884, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.471757 644063 task_exit.go:204] [ 884: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.471728 644063 task_signals.go:204] [ 884: 885] Signal 884, PID: 885, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.471740 644063 task_signals.go:204] [ 884: 888] Signal 884, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.471768 644063 task_exit.go:204] [ 884: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.471801 644063 task_exit.go:204] [ 884: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.471837 644063 task_signals.go:204] [ 884: 887] Signal 884, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.471877 644063 task_exit.go:204] [ 884: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.471912 644063 task_exit.go:204] [ 884: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.471924 644063 task_exit.go:204] [ 884: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.471943 644063 task_exit.go:204] [ 884: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.471957 644063 task_exit.go:204] [ 884: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.471963 644063 task_exit.go:204] [ 884: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.471973 644063 task_exit.go:204] [ 884: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.473580 644063 task_exit.go:204] [ 884: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.473626 644063 task_exit.go:204] [ 884: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.473645 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.473691 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.473729 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.473828 644063 task_exit.go:204] [ 884: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.474408 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.476002 644063 syscalls.go:262] [ 889: 889] Allocating stack with size of 8388608 bytes D0713 05:18:04.476096 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.480137 644063 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.480175 644063 usertrap_amd64.go:106] [ 889: 889] Map a usertrap vma at 64000 D0713 05:18:04.480268 644063 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00169d800 1 D0713 05:18:04.480324 644063 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:04.481218 644063 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.481258 644063 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00169d800 2 D0713 05:18:04.481275 644063 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:04.482227 644063 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.482255 644063 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00169d800 3 D0713 05:18:04.482271 644063 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:04.489392 644063 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.489448 644063 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00169d800 4 D0713 05:18:04.489466 644063 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:04.492290 644063 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.492357 644063 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00169d800 5 D0713 05:18:04.492410 644063 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:04.492776 644063 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.492820 644063 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00169d800 6 D0713 05:18:04.492847 644063 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:04.493566 644063 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.493603 644063 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00169d800 7 D0713 05:18:04.493616 644063 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:04.493915 644063 usertrap_amd64.go:212] [ 889: 890] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.493944 644063 usertrap_amd64.go:122] [ 889: 890] Allocate a new trap: 0xc00169d800 8 D0713 05:18:04.493957 644063 usertrap_amd64.go:225] [ 889: 890] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:04.494300 644063 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.494325 644063 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00169d800 9 D0713 05:18:04.494335 644063 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:04.494726 644063 usertrap_amd64.go:212] [ 889: 890] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.494753 644063 usertrap_amd64.go:122] [ 889: 890] Allocate a new trap: 0xc00169d800 10 D0713 05:18:04.494763 644063 usertrap_amd64.go:225] [ 889: 890] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:04.503946 644063 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.503986 644063 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00169d800 11 D0713 05:18:04.504000 644063 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:04.506815 644063 usertrap_amd64.go:212] [ 889: 890] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.506873 644063 usertrap_amd64.go:122] [ 889: 890] Allocate a new trap: 0xc00169d800 12 D0713 05:18:04.506899 644063 usertrap_amd64.go:225] [ 889: 890] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:04.507351 644063 usertrap_amd64.go:212] [ 889: 890] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.507388 644063 usertrap_amd64.go:122] [ 889: 890] Allocate a new trap: 0xc00169d800 13 D0713 05:18:04.507404 644063 usertrap_amd64.go:225] [ 889: 890] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:04.507476 644063 task_signals.go:470] [ 889: 889] Notified of signal 23 D0713 05:18:04.507571 644063 task_signals.go:220] [ 889: 889] Signal 23: delivering to handler D0713 05:18:04.515226 644063 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.515271 644063 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00169d800 14 D0713 05:18:04.515284 644063 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:04.515343 644063 task_exit.go:204] [ 889: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.515383 644063 task_signals.go:204] [ 889: 891] Signal 889, PID: 891, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.515391 644063 task_exit.go:204] [ 889: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.515421 644063 task_signals.go:204] [ 889: 892] Signal 889, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.515435 644063 task_signals.go:204] [ 889: 893] Signal 889, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.515429 644063 task_signals.go:204] [ 889: 890] Signal 889, PID: 890, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.515442 644063 task_exit.go:204] [ 889: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.515437 644063 task_signals.go:204] [ 889: 894] Signal 889, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.515471 644063 task_exit.go:204] [ 889: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.515494 644063 task_exit.go:204] [ 889: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.515509 644063 task_exit.go:204] [ 889: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.515517 644063 task_exit.go:204] [ 889: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.515524 644063 task_exit.go:204] [ 889: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.515532 644063 task_exit.go:204] [ 889: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.515578 644063 task_exit.go:204] [ 889: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.515596 644063 task_exit.go:204] [ 889: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.515610 644063 task_exit.go:204] [ 889: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.515618 644063 task_exit.go:204] [ 889: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.515632 644063 task_exit.go:204] [ 889: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.515641 644063 task_exit.go:204] [ 889: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.516982 644063 task_exit.go:204] [ 889: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.517014 644063 task_exit.go:204] [ 889: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.517028 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.517101 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.517120 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.517280 644063 task_exit.go:204] [ 889: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.517400 644063 task_signals.go:470] [ 6: 13] Notified of signal 23 D0713 05:18:04.517450 644063 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 05:18:04.517902 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.519334 644063 syscalls.go:262] [ 895: 895] Allocating stack with size of 8388608 bytes D0713 05:18:04.519505 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.521064 644063 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.521105 644063 usertrap_amd64.go:106] [ 895: 895] Map a usertrap vma at 67000 D0713 05:18:04.521185 644063 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001b84ea0 1 D0713 05:18:04.521216 644063 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:04.521476 644063 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.521499 644063 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001b84ea0 2 D0713 05:18:04.521512 644063 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:04.522355 644063 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.522388 644063 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001b84ea0 3 D0713 05:18:04.522399 644063 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:04.528365 644063 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.528400 644063 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001b84ea0 4 D0713 05:18:04.528415 644063 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:04.529812 644063 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.529852 644063 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001b84ea0 5 D0713 05:18:04.529874 644063 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:04.529946 644063 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.529968 644063 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001b84ea0 6 D0713 05:18:04.529977 644063 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:04.530446 644063 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.530483 644063 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001b84ea0 7 D0713 05:18:04.530494 644063 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:04.530666 644063 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.530690 644063 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001b84ea0 8 D0713 05:18:04.530700 644063 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:04.530897 644063 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.530965 644063 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001b84ea0 9 D0713 05:18:04.531019 644063 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:04.531087 644063 usertrap_amd64.go:212] [ 895: 897] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:04.531096 644063 usertrap_amd64.go:122] [ 895: 897] Allocate a new trap: 0xc001b84ea0 10 D0713 05:18:04.531106 644063 usertrap_amd64.go:225] [ 895: 897] Apply the binary patch addr 46b6e0 trap addr 67320 ([184 24 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:04.531117 644063 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.531124 644063 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001b84ea0 11 D0713 05:18:04.531148 644063 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b57c trap addr 67370 ([184 202 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:04.540437 644063 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.540480 644063 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001b84ea0 12 D0713 05:18:04.540493 644063 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:04.543163 644063 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.543255 644063 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001b84ea0 13 D0713 05:18:04.544752 644063 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:04.544833 644063 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.544846 644063 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001b84ea0 14 D0713 05:18:04.544873 644063 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:04.544927 644063 task_signals.go:470] [ 895: 895] Notified of signal 23 D0713 05:18:04.545065 644063 task_signals.go:220] [ 895: 895] Signal 23: delivering to handler D0713 05:18:04.551709 644063 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.551772 644063 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001b84ea0 15 D0713 05:18:04.551793 644063 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 05:18:04.551856 644063 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.551894 644063 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.551936 644063 task_signals.go:204] [ 895: 896] Signal 895, PID: 896, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.551970 644063 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.551979 644063 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.551984 644063 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.552012 644063 task_signals.go:204] [ 895: 899] Signal 895, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.552022 644063 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.552029 644063 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.552026 644063 task_signals.go:204] [ 895: 897] Signal 895, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.552035 644063 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.552085 644063 task_signals.go:204] [ 895: 898] Signal 895, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.552185 644063 task_signals.go:204] [ 895: 900] Signal 895, PID: 900, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.552241 644063 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.552271 644063 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.552280 644063 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.552293 644063 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.552302 644063 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.552307 644063 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.552317 644063 task_exit.go:204] [ 895: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.553717 644063 task_exit.go:204] [ 895: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.553747 644063 task_exit.go:204] [ 895: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.553762 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.554273 644063 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.554401 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.554424 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.554449 644063 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 05:18:04.554485 644063 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 05:18:04.555002 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.556576 644063 syscalls.go:262] [ 901: 901] Allocating stack with size of 8388608 bytes D0713 05:18:04.556724 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.558354 644063 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.558409 644063 usertrap_amd64.go:106] [ 901: 901] Map a usertrap vma at 62000 D0713 05:18:04.558524 644063 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00169df50 1 D0713 05:18:04.558583 644063 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:04.559185 644063 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.559215 644063 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00169df50 2 D0713 05:18:04.559229 644063 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:04.560001 644063 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.560030 644063 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00169df50 3 D0713 05:18:04.560042 644063 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:04.570178 644063 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.570222 644063 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00169df50 4 D0713 05:18:04.570236 644063 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:04.571851 644063 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.571918 644063 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00169df50 5 D0713 05:18:04.571937 644063 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:04.572006 644063 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.572023 644063 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00169df50 6 D0713 05:18:04.572032 644063 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:04.572456 644063 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.572491 644063 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00169df50 7 D0713 05:18:04.572502 644063 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:04.572677 644063 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.572701 644063 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc00169df50 8 D0713 05:18:04.572711 644063 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:04.572936 644063 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.573000 644063 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc00169df50 9 D0713 05:18:04.573010 644063 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:04.573084 644063 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.573106 644063 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00169df50 10 D0713 05:18:04.573116 644063 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:04.583666 644063 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.583738 644063 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc00169df50 11 D0713 05:18:04.583754 644063 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:04.583817 644063 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.583839 644063 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc00169df50 12 D0713 05:18:04.583849 644063 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:04.583891 644063 task_signals.go:470] [ 901: 901] Notified of signal 23 D0713 05:18:04.583959 644063 task_signals.go:220] [ 901: 901] Signal 23: delivering to handler D0713 05:18:04.588329 644063 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.588349 644063 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00169df50 13 D0713 05:18:04.588359 644063 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:04.595432 644063 task_signals.go:470] [ 901: 901] Notified of signal 23 D0713 05:18:04.595612 644063 task_signals.go:220] [ 901: 901] Signal 23: delivering to handler D0713 05:18:04.600727 644063 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.600859 644063 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc00169df50 14 D0713 05:18:04.600895 644063 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:04.601055 644063 task_exit.go:204] [ 901: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.601127 644063 task_signals.go:204] [ 901: 905] Signal 901, PID: 905, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.601127 644063 task_signals.go:204] [ 901: 902] Signal 901, PID: 902, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.601167 644063 task_signals.go:204] [ 901: 903] Signal 901, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.601187 644063 task_exit.go:204] [ 901: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.601214 644063 task_signals.go:204] [ 901: 904] Signal 901, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.601227 644063 task_exit.go:204] [ 901: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.601239 644063 task_exit.go:204] [ 901: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.601247 644063 task_exit.go:204] [ 901: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.601266 644063 task_exit.go:204] [ 901: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.601299 644063 task_exit.go:204] [ 901: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.601307 644063 task_exit.go:204] [ 901: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.601327 644063 task_exit.go:204] [ 901: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.601342 644063 task_exit.go:204] [ 901: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.601349 644063 task_exit.go:204] [ 901: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.601358 644063 task_exit.go:204] [ 901: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.602626 644063 task_exit.go:204] [ 901: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.602659 644063 task_exit.go:204] [ 901: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.602676 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.603419 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.603464 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.604153 644063 task_exit.go:204] [ 901: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.606223 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.607647 644063 syscalls.go:262] [ 906: 906] Allocating stack with size of 8388608 bytes D0713 05:18:04.607764 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.613512 644063 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.613564 644063 usertrap_amd64.go:106] [ 906: 906] Map a usertrap vma at 64000 D0713 05:18:04.613651 644063 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001df2030 1 D0713 05:18:04.613701 644063 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:04.614132 644063 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.614176 644063 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001df2030 2 D0713 05:18:04.614195 644063 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:04.614714 644063 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.614744 644063 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001df2030 3 D0713 05:18:04.614759 644063 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:04.620979 644063 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.621020 644063 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001df2030 4 D0713 05:18:04.621036 644063 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:04.622354 644063 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.622460 644063 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001df2030 5 D0713 05:18:04.622544 644063 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:04.623002 644063 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.623035 644063 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001df2030 6 D0713 05:18:04.623046 644063 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:04.623563 644063 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.623585 644063 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001df2030 7 D0713 05:18:04.623593 644063 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:04.624022 644063 usertrap_amd64.go:212] [ 906: 907] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.624067 644063 usertrap_amd64.go:122] [ 906: 907] Allocate a new trap: 0xc001df2030 8 D0713 05:18:04.624086 644063 usertrap_amd64.go:225] [ 906: 907] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:04.624250 644063 usertrap_amd64.go:212] [ 906: 907] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.624273 644063 usertrap_amd64.go:122] [ 906: 907] Allocate a new trap: 0xc001df2030 9 D0713 05:18:04.624283 644063 usertrap_amd64.go:225] [ 906: 907] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:04.625006 644063 usertrap_amd64.go:212] [ 906: 907] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.625047 644063 usertrap_amd64.go:122] [ 906: 907] Allocate a new trap: 0xc001df2030 10 D0713 05:18:04.625061 644063 usertrap_amd64.go:225] [ 906: 907] Apply the binary patch addr 46b020 trap addr 64320 ([184 39 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:04.625078 644063 usertrap_amd64.go:212] [ 906: 907] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.625084 644063 usertrap_amd64.go:122] [ 906: 907] Allocate a new trap: 0xc001df2030 11 D0713 05:18:04.625091 644063 usertrap_amd64.go:225] [ 906: 907] Apply the binary patch addr 46b04f trap addr 64370 ([184 234 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:04.625109 644063 task_signals.go:470] [ 906: 906] Notified of signal 23 D0713 05:18:04.633042 644063 task_signals.go:220] [ 906: 906] Signal 23: delivering to handler D0713 05:18:04.633310 644063 task_signals.go:470] [ 906: 906] Notified of signal 23 D0713 05:18:04.633486 644063 task_signals.go:220] [ 906: 906] Signal 23: delivering to handler D0713 05:18:04.633596 644063 usertrap_amd64.go:212] [ 906: 908] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.633617 644063 usertrap_amd64.go:122] [ 906: 908] Allocate a new trap: 0xc001df2030 12 D0713 05:18:04.633633 644063 usertrap_amd64.go:225] [ 906: 908] Apply the binary patch addr 46b57c trap addr 643c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:04.640730 644063 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.640772 644063 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001df2030 13 D0713 05:18:04.640789 644063 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:04.645818 644063 task_signals.go:470] [ 906: 906] Notified of signal 23 D0713 05:18:04.645967 644063 task_signals.go:220] [ 906: 906] Signal 23: delivering to handler D0713 05:18:04.652237 644063 usertrap_amd64.go:212] [ 906: 906] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.652309 644063 usertrap_amd64.go:122] [ 906: 906] Allocate a new trap: 0xc001df2030 14 D0713 05:18:04.652328 644063 usertrap_amd64.go:225] [ 906: 906] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:04.652426 644063 task_exit.go:204] [ 906: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.652460 644063 task_exit.go:204] [ 906: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.652499 644063 task_signals.go:204] [ 906: 911] Signal 906, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.652517 644063 task_signals.go:204] [ 906: 909] Signal 906, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.652528 644063 task_exit.go:204] [ 906: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.652475 644063 task_signals.go:204] [ 906: 908] Signal 906, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.652538 644063 task_exit.go:204] [ 906: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.652538 644063 task_signals.go:204] [ 906: 907] Signal 906, PID: 907, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.652545 644063 task_exit.go:204] [ 906: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.652493 644063 task_signals.go:204] [ 906: 910] Signal 906, PID: 910, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.652578 644063 task_exit.go:204] [ 906: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.652602 644063 task_exit.go:204] [ 906: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.652610 644063 task_exit.go:204] [ 906: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.652620 644063 task_exit.go:204] [ 906: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.652654 644063 task_exit.go:204] [ 906: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.652661 644063 task_exit.go:204] [ 906: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.652673 644063 task_exit.go:204] [ 906: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.652681 644063 task_exit.go:204] [ 906: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.652687 644063 task_exit.go:204] [ 906: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.652696 644063 task_exit.go:204] [ 906: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.654098 644063 task_exit.go:204] [ 906: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.654129 644063 task_exit.go:204] [ 906: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.654144 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.654225 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.654239 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.654394 644063 task_exit.go:204] [ 906: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.655221 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.656715 644063 syscalls.go:262] [ 912: 912] Allocating stack with size of 8388608 bytes D0713 05:18:04.656820 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.659104 644063 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.659141 644063 usertrap_amd64.go:106] [ 912: 912] Map a usertrap vma at 6a000 D0713 05:18:04.659208 644063 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001df2450 1 D0713 05:18:04.659239 644063 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:04.659612 644063 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.659702 644063 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001df2450 2 D0713 05:18:04.659721 644063 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:04.660354 644063 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.660383 644063 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001df2450 3 D0713 05:18:04.660392 644063 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:04.667010 644063 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.667051 644063 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001df2450 4 D0713 05:18:04.667068 644063 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:04.668467 644063 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.668501 644063 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001df2450 5 D0713 05:18:04.668515 644063 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:04.668555 644063 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.668572 644063 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001df2450 6 D0713 05:18:04.668580 644063 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:04.668802 644063 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.668827 644063 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001df2450 7 D0713 05:18:04.668837 644063 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:04.669083 644063 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.669117 644063 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc001df2450 8 D0713 05:18:04.669128 644063 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:04.669246 644063 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.669271 644063 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc001df2450 9 D0713 05:18:04.669283 644063 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:04.669372 644063 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.669428 644063 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001df2450 10 D0713 05:18:04.669440 644063 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:04.677625 644063 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.677649 644063 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001df2450 11 D0713 05:18:04.677666 644063 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:04.681118 644063 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.681176 644063 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc001df2450 12 D0713 05:18:04.681192 644063 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:04.681336 644063 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.681372 644063 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc001df2450 13 D0713 05:18:04.681384 644063 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:04.681435 644063 task_signals.go:470] [ 912: 912] Notified of signal 23 D0713 05:18:04.681781 644063 task_signals.go:220] [ 912: 912] Signal 23: delivering to handler D0713 05:18:04.689587 644063 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.689638 644063 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001df2450 14 D0713 05:18:04.689655 644063 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:04.689694 644063 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.689721 644063 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.689741 644063 task_signals.go:204] [ 912: 914] Signal 912, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.689782 644063 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.689778 644063 task_signals.go:204] [ 912: 916] Signal 912, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.689814 644063 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.689837 644063 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.689853 644063 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.689761 644063 task_signals.go:204] [ 912: 915] Signal 912, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.689885 644063 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.689893 644063 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.689900 644063 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.689912 644063 task_signals.go:204] [ 912: 913] Signal 912, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.689932 644063 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.689957 644063 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.689996 644063 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.691166 644063 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.691201 644063 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.691215 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.691258 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.691292 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.691422 644063 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.692224 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.694018 644063 syscalls.go:262] [ 917: 917] Allocating stack with size of 8388608 bytes D0713 05:18:04.694166 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.698406 644063 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.698459 644063 usertrap_amd64.go:106] [ 917: 917] Map a usertrap vma at 62000 D0713 05:18:04.698586 644063 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0009a3920 1 D0713 05:18:04.698613 644063 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:04.699058 644063 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.699101 644063 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0009a3920 2 D0713 05:18:04.699113 644063 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:04.699816 644063 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.699851 644063 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0009a3920 3 D0713 05:18:04.699866 644063 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:04.709813 644063 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.709902 644063 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0009a3920 4 D0713 05:18:04.709917 644063 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:04.710895 644063 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.710913 644063 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0009a3920 5 D0713 05:18:04.710924 644063 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:04.710959 644063 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.710966 644063 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0009a3920 6 D0713 05:18:04.710979 644063 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:04.711150 644063 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.711170 644063 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0009a3920 7 D0713 05:18:04.711177 644063 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:04.711342 644063 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.711367 644063 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc0009a3920 8 D0713 05:18:04.711383 644063 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:04.711578 644063 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.711615 644063 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc0009a3920 9 D0713 05:18:04.711654 644063 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:04.711668 644063 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.711684 644063 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0009a3920 10 D0713 05:18:04.711692 644063 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:04.722795 644063 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.722858 644063 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0009a3920 11 D0713 05:18:04.722878 644063 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:04.734192 644063 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.734256 644063 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc0009a3920 12 D0713 05:18:04.734274 644063 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:04.734321 644063 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.734341 644063 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc0009a3920 13 D0713 05:18:04.734356 644063 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:04.734395 644063 task_signals.go:470] [ 917: 917] Notified of signal 23 D0713 05:18:04.734473 644063 task_signals.go:220] [ 917: 917] Signal 23: delivering to handler D0713 05:18:04.734845 644063 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.734871 644063 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc0009a3920 14 D0713 05:18:04.734882 644063 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:04.735015 644063 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.735059 644063 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.735059 644063 task_signals.go:204] [ 917: 921] Signal 917, PID: 921, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.735081 644063 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.735095 644063 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.735102 644063 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.735120 644063 task_signals.go:204] [ 917: 922] Signal 917, PID: 922, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.735151 644063 task_signals.go:204] [ 917: 919] Signal 917, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.735171 644063 task_exit.go:204] [ 917: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.735181 644063 task_signals.go:204] [ 917: 920] Signal 917, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.735193 644063 task_signals.go:204] [ 917: 918] Signal 917, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.735205 644063 task_exit.go:204] [ 917: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.735211 644063 task_exit.go:204] [ 917: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.735221 644063 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.735229 644063 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.735235 644063 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.735245 644063 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.735253 644063 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.735259 644063 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.735276 644063 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.736488 644063 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.736583 644063 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.736604 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.736662 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.736682 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.736770 644063 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.737341 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.738881 644063 syscalls.go:262] [ 923: 923] Allocating stack with size of 8388608 bytes D0713 05:18:04.738978 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.740206 644063 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.740244 644063 usertrap_amd64.go:106] [ 923: 923] Map a usertrap vma at 60000 D0713 05:18:04.740316 644063 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001eb0990 1 D0713 05:18:04.740333 644063 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:04.740755 644063 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.740780 644063 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001eb0990 2 D0713 05:18:04.740789 644063 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:04.741467 644063 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.741520 644063 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001eb0990 3 D0713 05:18:04.741535 644063 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:04.747188 644063 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.747231 644063 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001eb0990 4 D0713 05:18:04.747254 644063 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:04.748225 644063 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.748255 644063 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001eb0990 5 D0713 05:18:04.748267 644063 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:04.748331 644063 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.748347 644063 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001eb0990 6 D0713 05:18:04.748352 644063 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:04.748663 644063 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.748685 644063 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001eb0990 7 D0713 05:18:04.748695 644063 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:04.748921 644063 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.748969 644063 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc001eb0990 8 D0713 05:18:04.748982 644063 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:04.749238 644063 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.749266 644063 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc001eb0990 9 D0713 05:18:04.749276 644063 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:04.749290 644063 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.749299 644063 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001eb0990 10 D0713 05:18:04.749309 644063 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:04.757487 644063 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.757523 644063 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001eb0990 11 D0713 05:18:04.757535 644063 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:04.760161 644063 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.760180 644063 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc001eb0990 12 D0713 05:18:04.760190 644063 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:04.760234 644063 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.760254 644063 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc001eb0990 13 D0713 05:18:04.760263 644063 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:04.760282 644063 task_signals.go:470] [ 923: 923] Notified of signal 23 D0713 05:18:04.760339 644063 task_signals.go:220] [ 923: 923] Signal 23: delivering to handler D0713 05:18:04.771269 644063 task_signals.go:470] [ 923: 923] Notified of signal 23 D0713 05:18:04.772191 644063 task_signals.go:220] [ 923: 923] Signal 23: delivering to handler D0713 05:18:04.772704 644063 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.772741 644063 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001eb0990 14 D0713 05:18:04.772758 644063 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:04.772808 644063 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.772835 644063 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.772862 644063 task_signals.go:204] [ 923: 924] Signal 923, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.772877 644063 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.772885 644063 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.772891 644063 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.772909 644063 task_signals.go:204] [ 923: 925] Signal 923, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.772929 644063 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.772936 644063 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.772974 644063 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.772991 644063 task_signals.go:204] [ 923: 926] Signal 923, PID: 926, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.773013 644063 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.773021 644063 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.773027 644063 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.773048 644063 task_signals.go:204] [ 923: 927] Signal 923, PID: 927, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.773058 644063 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.774310 644063 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.774351 644063 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.774365 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.774440 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.774460 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.774609 644063 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.775448 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.777305 644063 syscalls.go:262] [ 928: 928] Allocating stack with size of 8388608 bytes D0713 05:18:04.777631 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.786057 644063 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.786109 644063 usertrap_amd64.go:106] [ 928: 928] Map a usertrap vma at 6a000 D0713 05:18:04.786175 644063 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc001eb0e10 1 D0713 05:18:04.786203 644063 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:04.786501 644063 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.786522 644063 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc001eb0e10 2 D0713 05:18:04.786531 644063 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:04.787055 644063 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.787135 644063 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc001eb0e10 3 D0713 05:18:04.787151 644063 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:04.794737 644063 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.794773 644063 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc001eb0e10 4 D0713 05:18:04.794787 644063 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:04.796072 644063 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.796103 644063 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc001eb0e10 5 D0713 05:18:04.796114 644063 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:04.796146 644063 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.796151 644063 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc001eb0e10 6 D0713 05:18:04.796156 644063 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:04.796329 644063 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.796350 644063 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc001eb0e10 7 D0713 05:18:04.796359 644063 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:04.796543 644063 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.796574 644063 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc001eb0e10 8 D0713 05:18:04.796589 644063 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:04.796773 644063 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.796993 644063 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc001eb0e10 9 D0713 05:18:04.797078 644063 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:04.797146 644063 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.797155 644063 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc001eb0e10 10 D0713 05:18:04.797164 644063 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:04.797641 644063 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.797668 644063 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc001eb0e10 11 D0713 05:18:04.797678 644063 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:04.797811 644063 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.797830 644063 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc001eb0e10 12 D0713 05:18:04.797837 644063 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:04.797853 644063 task_signals.go:470] [ 928: 928] Notified of signal 23 D0713 05:18:04.797869 644063 task_signals.go:220] [ 928: 928] Signal 23: delivering to handler D0713 05:18:04.806550 644063 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.806587 644063 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc001eb0e10 13 D0713 05:18:04.806600 644063 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:04.810466 644063 task_signals.go:470] [ 928: 928] Notified of signal 23 D0713 05:18:04.810597 644063 task_signals.go:179] [ 928: 928] Restarting syscall 202: interrupted by signal 23 D0713 05:18:04.810615 644063 task_signals.go:220] [ 928: 928] Signal 23: delivering to handler D0713 05:18:04.821556 644063 task_signals.go:470] [ 928: 928] Notified of signal 23 D0713 05:18:04.825560 644063 task_signals.go:220] [ 928: 928] Signal 23: delivering to handler D0713 05:18:04.826241 644063 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.826374 644063 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc001eb0e10 14 D0713 05:18:04.826492 644063 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:04.826643 644063 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.826790 644063 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.826799 644063 task_signals.go:204] [ 928: 932] Signal 928, PID: 932, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.826938 644063 task_signals.go:204] [ 928: 931] Signal 928, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.826956 644063 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.826968 644063 task_signals.go:204] [ 928: 933] Signal 928, PID: 933, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.826981 644063 task_signals.go:204] [ 928: 930] Signal 928, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.827047 644063 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.827056 644063 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.827070 644063 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.827094 644063 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.827111 644063 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.827121 644063 task_exit.go:204] [ 928: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.827137 644063 task_exit.go:204] [ 928: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.827143 644063 task_exit.go:204] [ 928: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.827153 644063 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.827174 644063 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.827189 644063 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.828179 644063 task_signals.go:204] [ 928: 929] Signal 928, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.828223 644063 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.829570 644063 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.829687 644063 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.829760 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.833044 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.833086 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.837156 644063 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.841470 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.842872 644063 syscalls.go:262] [ 934: 934] Allocating stack with size of 8388608 bytes D0713 05:18:04.842994 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.858086 644063 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.858292 644063 usertrap_amd64.go:106] [ 934: 934] Map a usertrap vma at 60000 D0713 05:18:04.858449 644063 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc0009a2420 1 D0713 05:18:04.858519 644063 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:04.858797 644063 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.858859 644063 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc0009a2420 2 D0713 05:18:04.859565 644063 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:04.860456 644063 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.860514 644063 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc0009a2420 3 D0713 05:18:04.860579 644063 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:04.869530 644063 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.869737 644063 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc0009a2420 4 D0713 05:18:04.869787 644063 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:04.871295 644063 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.871331 644063 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc0009a2420 5 D0713 05:18:04.871347 644063 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:04.871574 644063 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.871598 644063 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc0009a2420 6 D0713 05:18:04.871610 644063 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:04.872125 644063 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.872213 644063 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc0009a2420 7 D0713 05:18:04.872242 644063 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:04.872912 644063 usertrap_amd64.go:212] [ 934: 936] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.872980 644063 usertrap_amd64.go:122] [ 934: 936] Allocate a new trap: 0xc0009a2420 8 D0713 05:18:04.873001 644063 usertrap_amd64.go:225] [ 934: 936] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:04.873253 644063 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.873266 644063 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc0009a2420 9 D0713 05:18:04.873277 644063 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:04.873827 644063 usertrap_amd64.go:212] [ 934: 935] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.873859 644063 usertrap_amd64.go:122] [ 934: 935] Allocate a new trap: 0xc0009a2420 10 D0713 05:18:04.873873 644063 usertrap_amd64.go:225] [ 934: 935] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:04.874865 644063 usertrap_amd64.go:212] [ 934: 935] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.874948 644063 usertrap_amd64.go:122] [ 934: 935] Allocate a new trap: 0xc0009a2420 11 D0713 05:18:04.874979 644063 usertrap_amd64.go:225] [ 934: 935] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:04.875078 644063 usertrap_amd64.go:212] [ 934: 935] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.875107 644063 usertrap_amd64.go:122] [ 934: 935] Allocate a new trap: 0xc0009a2420 12 D0713 05:18:04.875121 644063 usertrap_amd64.go:225] [ 934: 935] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:04.875215 644063 task_signals.go:470] [ 934: 934] Notified of signal 23 D0713 05:18:04.876845 644063 task_signals.go:220] [ 934: 934] Signal 23: delivering to handler D0713 05:18:04.882460 644063 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.882509 644063 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc0009a2420 13 D0713 05:18:04.882532 644063 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:04.887465 644063 task_signals.go:470] [ 934: 934] Notified of signal 23 D0713 05:18:04.887560 644063 task_signals.go:220] [ 934: 934] Signal 23: delivering to handler D0713 05:18:04.896376 644063 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.896409 644063 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc0009a2420 14 D0713 05:18:04.896425 644063 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:04.896485 644063 task_exit.go:204] [ 934: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.896511 644063 task_exit.go:204] [ 934: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.896539 644063 task_signals.go:204] [ 934: 935] Signal 934, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.896564 644063 task_exit.go:204] [ 934: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.896573 644063 task_exit.go:204] [ 934: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.896578 644063 task_exit.go:204] [ 934: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.896595 644063 task_signals.go:204] [ 934: 936] Signal 934, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.896603 644063 task_exit.go:204] [ 934: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.896609 644063 task_exit.go:204] [ 934: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.896615 644063 task_exit.go:204] [ 934: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.896627 644063 task_signals.go:204] [ 934: 937] Signal 934, PID: 937, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.896636 644063 task_exit.go:204] [ 934: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.896643 644063 task_exit.go:204] [ 934: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.896649 644063 task_exit.go:204] [ 934: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.896665 644063 task_signals.go:204] [ 934: 938] Signal 934, PID: 938, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.896674 644063 task_exit.go:204] [ 934: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.898141 644063 task_exit.go:204] [ 934: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.898221 644063 task_exit.go:204] [ 934: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.898242 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.898278 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.898288 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.898402 644063 task_exit.go:204] [ 934: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.898532 644063 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 05:18:04.898567 644063 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 05:18:04.899195 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.900553 644063 syscalls.go:262] [ 939: 939] Allocating stack with size of 8388608 bytes D0713 05:18:04.900666 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.906204 644063 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.906268 644063 usertrap_amd64.go:106] [ 939: 939] Map a usertrap vma at 65000 D0713 05:18:04.906357 644063 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001df2480 1 D0713 05:18:04.906398 644063 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:04.907325 644063 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.907372 644063 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001df2480 2 D0713 05:18:04.907390 644063 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:04.909309 644063 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.909347 644063 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001df2480 3 D0713 05:18:04.909371 644063 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:04.915943 644063 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.915975 644063 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001df2480 4 D0713 05:18:04.915990 644063 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:04.917335 644063 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.917441 644063 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001df2480 5 D0713 05:18:04.917529 644063 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:04.917957 644063 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.917983 644063 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001df2480 6 D0713 05:18:04.917996 644063 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:04.918552 644063 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.918586 644063 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001df2480 7 D0713 05:18:04.918598 644063 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:04.918981 644063 usertrap_amd64.go:212] [ 939: 940] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.919014 644063 usertrap_amd64.go:122] [ 939: 940] Allocate a new trap: 0xc001df2480 8 D0713 05:18:04.919029 644063 usertrap_amd64.go:225] [ 939: 940] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:04.919169 644063 usertrap_amd64.go:212] [ 939: 940] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.919178 644063 usertrap_amd64.go:122] [ 939: 940] Allocate a new trap: 0xc001df2480 9 D0713 05:18:04.919186 644063 usertrap_amd64.go:225] [ 939: 940] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:04.919270 644063 usertrap_amd64.go:212] [ 939: 940] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.919287 644063 usertrap_amd64.go:122] [ 939: 940] Allocate a new trap: 0xc001df2480 10 D0713 05:18:04.919298 644063 usertrap_amd64.go:225] [ 939: 940] Apply the binary patch addr 46b020 trap addr 65320 ([184 39 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:04.919318 644063 usertrap_amd64.go:212] [ 939: 940] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.919331 644063 usertrap_amd64.go:122] [ 939: 940] Allocate a new trap: 0xc001df2480 11 D0713 05:18:04.919337 644063 usertrap_amd64.go:225] [ 939: 940] Apply the binary patch addr 46b04f trap addr 65370 ([184 234 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:04.919354 644063 task_signals.go:481] [ 939: 939] No task notified of signal 23 D0713 05:18:04.919476 644063 task_signals.go:220] [ 939: 939] Signal 23: delivering to handler D0713 05:18:04.919794 644063 usertrap_amd64.go:212] [ 939: 941] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.919826 644063 usertrap_amd64.go:122] [ 939: 941] Allocate a new trap: 0xc001df2480 12 D0713 05:18:04.919838 644063 usertrap_amd64.go:225] [ 939: 941] Apply the binary patch addr 46b57c trap addr 653c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:04.927397 644063 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.927442 644063 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001df2480 13 D0713 05:18:04.927458 644063 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:04.931254 644063 task_signals.go:470] [ 939: 939] Notified of signal 23 D0713 05:18:04.931297 644063 task_signals.go:220] [ 939: 939] Signal 23: delivering to handler D0713 05:18:04.939164 644063 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.939216 644063 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001df2480 14 D0713 05:18:04.939235 644063 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:04.939296 644063 task_exit.go:204] [ 939: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.939321 644063 task_exit.go:204] [ 939: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.939350 644063 task_signals.go:204] [ 939: 940] Signal 939, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.939382 644063 task_exit.go:204] [ 939: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.939391 644063 task_exit.go:204] [ 939: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.939398 644063 task_exit.go:204] [ 939: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.939414 644063 task_signals.go:204] [ 939: 941] Signal 939, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.939426 644063 task_signals.go:204] [ 939: 944] Signal 939, PID: 944, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.939437 644063 task_exit.go:204] [ 939: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.939420 644063 task_signals.go:204] [ 939: 943] Signal 939, PID: 943, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.939445 644063 task_signals.go:204] [ 939: 945] Signal 939, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.939459 644063 task_signals.go:204] [ 939: 942] Signal 939, PID: 942, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.939472 644063 task_exit.go:204] [ 939: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.939498 644063 task_exit.go:204] [ 939: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.939506 644063 task_exit.go:204] [ 939: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.939518 644063 task_exit.go:204] [ 939: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.939535 644063 task_exit.go:204] [ 939: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.939541 644063 task_exit.go:204] [ 939: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.939552 644063 task_exit.go:204] [ 939: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.939566 644063 task_exit.go:204] [ 939: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.939576 644063 task_exit.go:204] [ 939: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.939592 644063 task_exit.go:204] [ 939: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.939598 644063 task_exit.go:204] [ 939: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.939607 644063 task_exit.go:204] [ 939: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.941138 644063 task_exit.go:204] [ 939: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.941178 644063 task_exit.go:204] [ 939: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.941192 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.941230 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.941274 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.941403 644063 task_exit.go:204] [ 939: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.941988 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.943523 644063 syscalls.go:262] [ 946: 946] Allocating stack with size of 8388608 bytes D0713 05:18:04.943681 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.952789 644063 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.952851 644063 usertrap_amd64.go:106] [ 946: 946] Map a usertrap vma at 65000 D0713 05:18:04.952934 644063 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc001d1a1e0 1 D0713 05:18:04.953001 644063 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:04.953308 644063 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.953322 644063 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc001d1a1e0 2 D0713 05:18:04.953333 644063 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:04.954081 644063 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.954099 644063 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc001d1a1e0 3 D0713 05:18:04.954112 644063 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:04.962019 644063 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.962064 644063 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc001d1a1e0 4 D0713 05:18:04.962079 644063 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:04.963215 644063 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.963242 644063 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc001d1a1e0 5 D0713 05:18:04.963254 644063 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:04.963288 644063 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.963294 644063 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc001d1a1e0 6 D0713 05:18:04.963300 644063 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:04.963631 644063 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.963661 644063 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc001d1a1e0 7 D0713 05:18:04.963671 644063 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:04.963837 644063 usertrap_amd64.go:212] [ 946: 947] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.963859 644063 usertrap_amd64.go:122] [ 946: 947] Allocate a new trap: 0xc001d1a1e0 8 D0713 05:18:04.963868 644063 usertrap_amd64.go:225] [ 946: 947] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:04.964054 644063 usertrap_amd64.go:212] [ 946: 948] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:04.964075 644063 usertrap_amd64.go:122] [ 946: 948] Allocate a new trap: 0xc001d1a1e0 9 D0713 05:18:04.964086 644063 usertrap_amd64.go:225] [ 946: 948] Apply the binary patch addr 46b6e0 trap addr 652d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:04.964125 644063 usertrap_amd64.go:212] [ 946: 947] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.964136 644063 usertrap_amd64.go:122] [ 946: 947] Allocate a new trap: 0xc001d1a1e0 10 D0713 05:18:04.964143 644063 usertrap_amd64.go:225] [ 946: 947] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:04.964164 644063 usertrap_amd64.go:212] [ 946: 948] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.964172 644063 usertrap_amd64.go:122] [ 946: 948] Allocate a new trap: 0xc001d1a1e0 11 D0713 05:18:04.964180 644063 usertrap_amd64.go:225] [ 946: 948] Apply the binary patch addr 46b57c trap addr 65370 ([184 202 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:04.971574 644063 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.971606 644063 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc001d1a1e0 12 D0713 05:18:04.971620 644063 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:04.975545 644063 usertrap_amd64.go:212] [ 946: 947] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.975583 644063 usertrap_amd64.go:122] [ 946: 947] Allocate a new trap: 0xc001d1a1e0 13 D0713 05:18:04.975597 644063 usertrap_amd64.go:225] [ 946: 947] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:04.975614 644063 usertrap_amd64.go:212] [ 946: 947] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.975620 644063 usertrap_amd64.go:122] [ 946: 947] Allocate a new trap: 0xc001d1a1e0 14 D0713 05:18:04.975641 644063 usertrap_amd64.go:225] [ 946: 947] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:04.975661 644063 task_signals.go:470] [ 946: 946] Notified of signal 23 D0713 05:18:04.975701 644063 task_signals.go:220] [ 946: 946] Signal 23: delivering to handler I0713 05:18:04.982736 644063 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0713 05:18:04.983970 644063 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.983992 644063 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc001d1a1e0 15 D0713 05:18:04.984008 644063 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 05:18:04.984091 644063 task_exit.go:204] [ 946: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.984122 644063 task_exit.go:204] [ 946: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.984175 644063 task_signals.go:204] [ 946: 947] Signal 946, PID: 947, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.984194 644063 task_exit.go:204] [ 946: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.984204 644063 task_exit.go:204] [ 946: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.984234 644063 task_exit.go:204] [ 946: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.984253 644063 task_signals.go:204] [ 946: 948] Signal 946, PID: 948, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.984264 644063 task_exit.go:204] [ 946: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.984277 644063 task_exit.go:204] [ 946: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.984283 644063 task_exit.go:204] [ 946: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.984303 644063 task_signals.go:204] [ 946: 949] Signal 946, PID: 949, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.984315 644063 task_exit.go:204] [ 946: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.984322 644063 task_exit.go:204] [ 946: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.984375 644063 task_exit.go:204] [ 946: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.984405 644063 task_signals.go:204] [ 946: 950] Signal 946, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.984429 644063 task_exit.go:204] [ 946: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.985646 644063 task_exit.go:204] [ 946: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.985678 644063 task_exit.go:204] [ 946: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.985701 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.985767 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.985787 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.985912 644063 task_exit.go:204] [ 946: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.986533 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.987901 644063 syscalls.go:262] [ 951: 951] Allocating stack with size of 8388608 bytes D0713 05:18:04.988018 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.990436 644063 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.990488 644063 usertrap_amd64.go:106] [ 951: 951] Map a usertrap vma at 65000 D0713 05:18:04.990547 644063 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001df28d0 1 D0713 05:18:04.990582 644063 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:04.990994 644063 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.991023 644063 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001df28d0 2 D0713 05:18:04.991037 644063 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:04.991405 644063 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.991425 644063 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001df28d0 3 D0713 05:18:04.991436 644063 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:04.998025 644063 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.998073 644063 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001df28d0 4 D0713 05:18:04.998090 644063 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:04.999343 644063 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.999378 644063 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001df28d0 5 D0713 05:18:04.999393 644063 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:04.999448 644063 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.999467 644063 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001df28d0 6 D0713 05:18:04.999477 644063 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:04.999747 644063 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.999777 644063 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001df28d0 7 D0713 05:18:04.999790 644063 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:05.000006 644063 usertrap_amd64.go:212] [ 951: 952] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.000028 644063 usertrap_amd64.go:122] [ 951: 952] Allocate a new trap: 0xc001df28d0 8 D0713 05:18:05.000041 644063 usertrap_amd64.go:225] [ 951: 952] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:05.000225 644063 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.000238 644063 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001df28d0 9 D0713 05:18:05.000247 644063 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:05.000268 644063 usertrap_amd64.go:212] [ 951: 952] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.000275 644063 usertrap_amd64.go:122] [ 951: 952] Allocate a new trap: 0xc001df28d0 10 D0713 05:18:05.000283 644063 usertrap_amd64.go:225] [ 951: 952] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:05.007657 644063 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.007696 644063 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001df28d0 11 D0713 05:18:05.007710 644063 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:05.011432 644063 usertrap_amd64.go:212] [ 951: 952] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.011463 644063 usertrap_amd64.go:122] [ 951: 952] Allocate a new trap: 0xc001df28d0 12 D0713 05:18:05.011476 644063 usertrap_amd64.go:225] [ 951: 952] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:05.011519 644063 usertrap_amd64.go:212] [ 951: 952] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.011529 644063 usertrap_amd64.go:122] [ 951: 952] Allocate a new trap: 0xc001df28d0 13 D0713 05:18:05.011538 644063 usertrap_amd64.go:225] [ 951: 952] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:05.011819 644063 task_signals.go:470] [ 951: 951] Notified of signal 23 D0713 05:18:05.012500 644063 task_signals.go:220] [ 951: 951] Signal 23: delivering to handler D0713 05:18:05.022138 644063 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.022177 644063 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001df28d0 14 D0713 05:18:05.022192 644063 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:05.022231 644063 task_exit.go:204] [ 951: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.022274 644063 task_exit.go:204] [ 951: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.022307 644063 task_signals.go:204] [ 951: 952] Signal 951, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.022323 644063 task_exit.go:204] [ 951: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.022332 644063 task_exit.go:204] [ 951: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.022339 644063 task_exit.go:204] [ 951: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.022364 644063 task_signals.go:204] [ 951: 953] Signal 951, PID: 953, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.022374 644063 task_exit.go:204] [ 951: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.022382 644063 task_exit.go:204] [ 951: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.022388 644063 task_exit.go:204] [ 951: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.022402 644063 task_signals.go:204] [ 951: 954] Signal 951, PID: 954, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.022411 644063 task_exit.go:204] [ 951: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.022417 644063 task_exit.go:204] [ 951: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.022423 644063 task_exit.go:204] [ 951: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.022435 644063 task_signals.go:204] [ 951: 955] Signal 951, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.022443 644063 task_exit.go:204] [ 951: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.023774 644063 task_exit.go:204] [ 951: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.023800 644063 task_exit.go:204] [ 951: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.023822 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.023907 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.023920 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.024018 644063 task_exit.go:204] [ 951: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.031254 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.032362 644063 syscalls.go:262] [ 956: 956] Allocating stack with size of 8388608 bytes D0713 05:18:05.032465 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.037614 644063 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.037663 644063 usertrap_amd64.go:106] [ 956: 956] Map a usertrap vma at 64000 D0713 05:18:05.037758 644063 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001df2cf0 1 D0713 05:18:05.037787 644063 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:05.038116 644063 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.038142 644063 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001df2cf0 2 D0713 05:18:05.038153 644063 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:05.038781 644063 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.038808 644063 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001df2cf0 3 D0713 05:18:05.038819 644063 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:05.044471 644063 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.044501 644063 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001df2cf0 4 D0713 05:18:05.044514 644063 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:05.046239 644063 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.046258 644063 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001df2cf0 5 D0713 05:18:05.046270 644063 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:05.046720 644063 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.046741 644063 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001df2cf0 6 D0713 05:18:05.046751 644063 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:05.046967 644063 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.046986 644063 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001df2cf0 7 D0713 05:18:05.046994 644063 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:05.047303 644063 usertrap_amd64.go:212] [ 956: 957] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.047319 644063 usertrap_amd64.go:122] [ 956: 957] Allocate a new trap: 0xc001df2cf0 8 D0713 05:18:05.047331 644063 usertrap_amd64.go:225] [ 956: 957] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:05.047480 644063 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.047498 644063 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001df2cf0 9 D0713 05:18:05.047506 644063 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:05.047531 644063 usertrap_amd64.go:212] [ 956: 957] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.047545 644063 usertrap_amd64.go:122] [ 956: 957] Allocate a new trap: 0xc001df2cf0 10 D0713 05:18:05.047552 644063 usertrap_amd64.go:225] [ 956: 957] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:05.048304 644063 usertrap_amd64.go:212] [ 956: 957] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.048332 644063 usertrap_amd64.go:122] [ 956: 957] Allocate a new trap: 0xc001df2cf0 11 D0713 05:18:05.048343 644063 usertrap_amd64.go:225] [ 956: 957] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:05.048381 644063 usertrap_amd64.go:212] [ 956: 957] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.048389 644063 usertrap_amd64.go:122] [ 956: 957] Allocate a new trap: 0xc001df2cf0 12 D0713 05:18:05.048398 644063 usertrap_amd64.go:225] [ 956: 957] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:05.048445 644063 task_signals.go:470] [ 956: 956] Notified of signal 23 D0713 05:18:05.048513 644063 task_signals.go:220] [ 956: 956] Signal 23: delivering to handler D0713 05:18:05.060035 644063 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.060084 644063 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001df2cf0 13 D0713 05:18:05.060101 644063 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:05.072414 644063 task_signals.go:470] [ 956: 956] Notified of signal 23 D0713 05:18:05.073340 644063 task_signals.go:220] [ 956: 956] Signal 23: delivering to handler I0713 05:18:05.077501 644063 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0713 05:18:05.077588 644063 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.077609 644063 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001df2cf0 14 D0713 05:18:05.077630 644063 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:05.077701 644063 task_exit.go:204] [ 956: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.077741 644063 task_signals.go:204] [ 956: 958] Signal 956, PID: 958, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.077745 644063 task_signals.go:204] [ 956: 957] Signal 956, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.077793 644063 task_signals.go:204] [ 956: 960] Signal 956, PID: 960, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.077809 644063 task_exit.go:204] [ 956: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.077833 644063 task_signals.go:204] [ 956: 959] Signal 956, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.077856 644063 task_exit.go:204] [ 956: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.077871 644063 task_exit.go:204] [ 956: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.077879 644063 task_exit.go:204] [ 956: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.077896 644063 task_exit.go:204] [ 956: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.077916 644063 task_exit.go:204] [ 956: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.077922 644063 task_exit.go:204] [ 956: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.077933 644063 task_exit.go:204] [ 956: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.077939 644063 task_exit.go:204] [ 956: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.077945 644063 task_exit.go:204] [ 956: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.077954 644063 task_exit.go:204] [ 956: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.079134 644063 task_exit.go:204] [ 956: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.079165 644063 task_exit.go:204] [ 956: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.079199 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.079237 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.079254 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.079331 644063 task_exit.go:204] [ 956: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.079840 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.081392 644063 syscalls.go:262] [ 961: 961] Allocating stack with size of 8388608 bytes D0713 05:18:05.081574 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.082561 644063 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.082595 644063 usertrap_amd64.go:106] [ 961: 961] Map a usertrap vma at 6a000 D0713 05:18:05.082704 644063 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc001b84e10 1 D0713 05:18:05.082769 644063 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:05.083145 644063 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.083171 644063 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc001b84e10 2 D0713 05:18:05.083182 644063 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:05.083803 644063 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.083960 644063 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc001b84e10 3 D0713 05:18:05.084091 644063 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:05.090854 644063 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.090882 644063 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc001b84e10 4 D0713 05:18:05.090896 644063 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:05.092146 644063 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.092191 644063 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc001b84e10 5 D0713 05:18:05.092207 644063 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:05.093138 644063 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.093168 644063 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc001b84e10 6 D0713 05:18:05.093182 644063 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:05.093898 644063 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.093964 644063 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc001b84e10 7 D0713 05:18:05.093984 644063 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:05.094229 644063 usertrap_amd64.go:212] [ 961: 962] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.094259 644063 usertrap_amd64.go:122] [ 961: 962] Allocate a new trap: 0xc001b84e10 8 D0713 05:18:05.094276 644063 usertrap_amd64.go:225] [ 961: 962] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:05.094530 644063 usertrap_amd64.go:212] [ 961: 963] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.094554 644063 usertrap_amd64.go:122] [ 961: 963] Allocate a new trap: 0xc001b84e10 9 D0713 05:18:05.094565 644063 usertrap_amd64.go:225] [ 961: 963] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:05.094754 644063 usertrap_amd64.go:212] [ 961: 964] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.094785 644063 usertrap_amd64.go:122] [ 961: 964] Allocate a new trap: 0xc001b84e10 10 D0713 05:18:05.094798 644063 usertrap_amd64.go:225] [ 961: 964] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:05.103163 644063 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.103212 644063 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc001b84e10 11 D0713 05:18:05.103230 644063 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:05.105965 644063 usertrap_amd64.go:212] [ 961: 962] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.105990 644063 usertrap_amd64.go:122] [ 961: 962] Allocate a new trap: 0xc001b84e10 12 D0713 05:18:05.106006 644063 usertrap_amd64.go:225] [ 961: 962] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:05.106155 644063 usertrap_amd64.go:212] [ 961: 962] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.106229 644063 usertrap_amd64.go:122] [ 961: 962] Allocate a new trap: 0xc001b84e10 13 D0713 05:18:05.106257 644063 usertrap_amd64.go:225] [ 961: 962] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:05.106339 644063 task_signals.go:470] [ 961: 961] Notified of signal 23 D0713 05:18:05.106533 644063 task_signals.go:220] [ 961: 961] Signal 23: delivering to handler I0713 05:18:05.116739 644063 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0713 05:18:05.116873 644063 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.116917 644063 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc001b84e10 14 D0713 05:18:05.116968 644063 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:05.117054 644063 task_exit.go:204] [ 961: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.117122 644063 task_signals.go:204] [ 961: 963] Signal 961, PID: 963, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.117121 644063 task_exit.go:204] [ 961: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.117161 644063 task_signals.go:204] [ 961: 962] Signal 961, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.117172 644063 task_signals.go:204] [ 961: 965] Signal 961, PID: 965, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.117185 644063 task_exit.go:204] [ 961: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.117227 644063 task_signals.go:204] [ 961: 964] Signal 961, PID: 964, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.117244 644063 task_exit.go:204] [ 961: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.117254 644063 task_exit.go:204] [ 961: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.117273 644063 task_exit.go:204] [ 961: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.117295 644063 task_exit.go:204] [ 961: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.117301 644063 task_exit.go:204] [ 961: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.117313 644063 task_exit.go:204] [ 961: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.117343 644063 task_exit.go:204] [ 961: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.117352 644063 task_exit.go:204] [ 961: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.117371 644063 task_exit.go:204] [ 961: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.118913 644063 task_exit.go:204] [ 961: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.118931 644063 task_exit.go:204] [ 961: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.118946 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.119042 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.119065 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.119189 644063 task_exit.go:204] [ 961: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.120081 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.121606 644063 syscalls.go:262] [ 966: 966] Allocating stack with size of 8388608 bytes D0713 05:18:05.121718 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.136537 644063 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.137307 644063 usertrap_amd64.go:106] [ 966: 966] Map a usertrap vma at 61000 D0713 05:18:05.137464 644063 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc001df31a0 1 D0713 05:18:05.137513 644063 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:05.138833 644063 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.138859 644063 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc001df31a0 2 D0713 05:18:05.138880 644063 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:05.140634 644063 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.140658 644063 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc001df31a0 3 D0713 05:18:05.140669 644063 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:05.151951 644063 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.151999 644063 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc001df31a0 4 D0713 05:18:05.152014 644063 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:05.153197 644063 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.153230 644063 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc001df31a0 5 D0713 05:18:05.153243 644063 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:05.153397 644063 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.153414 644063 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc001df31a0 6 D0713 05:18:05.153423 644063 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:05.153792 644063 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.153808 644063 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc001df31a0 7 D0713 05:18:05.153819 644063 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:05.154059 644063 usertrap_amd64.go:212] [ 966: 967] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.154072 644063 usertrap_amd64.go:122] [ 966: 967] Allocate a new trap: 0xc001df31a0 8 D0713 05:18:05.154082 644063 usertrap_amd64.go:225] [ 966: 967] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:05.154285 644063 usertrap_amd64.go:212] [ 966: 967] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.154313 644063 usertrap_amd64.go:122] [ 966: 967] Allocate a new trap: 0xc001df31a0 9 D0713 05:18:05.154327 644063 usertrap_amd64.go:225] [ 966: 967] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:05.154602 644063 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.154646 644063 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc001df31a0 10 D0713 05:18:05.154661 644063 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:05.163573 644063 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.163606 644063 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc001df31a0 11 D0713 05:18:05.163620 644063 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:05.167398 644063 usertrap_amd64.go:212] [ 966: 967] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.167424 644063 usertrap_amd64.go:122] [ 966: 967] Allocate a new trap: 0xc001df31a0 12 D0713 05:18:05.167435 644063 usertrap_amd64.go:225] [ 966: 967] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:05.167489 644063 usertrap_amd64.go:212] [ 966: 967] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.167505 644063 usertrap_amd64.go:122] [ 966: 967] Allocate a new trap: 0xc001df31a0 13 D0713 05:18:05.167513 644063 usertrap_amd64.go:225] [ 966: 967] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:05.167528 644063 task_signals.go:470] [ 966: 966] Notified of signal 23 D0713 05:18:05.167612 644063 task_signals.go:220] [ 966: 966] Signal 23: delivering to handler I0713 05:18:05.178119 644063 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0713 05:18:05.178214 644063 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.178229 644063 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc001df31a0 14 D0713 05:18:05.178242 644063 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:05.178273 644063 task_exit.go:204] [ 966: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.178297 644063 task_exit.go:204] [ 966: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.178322 644063 task_signals.go:204] [ 966: 967] Signal 966, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.178348 644063 task_exit.go:204] [ 966: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.178360 644063 task_exit.go:204] [ 966: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.178365 644063 task_exit.go:204] [ 966: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.178383 644063 task_signals.go:204] [ 966: 968] Signal 966, PID: 968, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.178391 644063 task_exit.go:204] [ 966: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.178398 644063 task_exit.go:204] [ 966: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.178403 644063 task_exit.go:204] [ 966: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.178416 644063 task_signals.go:204] [ 966: 969] Signal 966, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.178425 644063 task_exit.go:204] [ 966: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.178432 644063 task_exit.go:204] [ 966: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.178439 644063 task_exit.go:204] [ 966: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.178460 644063 task_signals.go:204] [ 966: 970] Signal 966, PID: 970, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.178485 644063 task_exit.go:204] [ 966: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.179708 644063 task_exit.go:204] [ 966: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.179742 644063 task_exit.go:204] [ 966: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.179755 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.179785 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.179800 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.180031 644063 task_exit.go:204] [ 966: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.180933 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.182223 644063 syscalls.go:262] [ 971: 971] Allocating stack with size of 8388608 bytes D0713 05:18:05.182310 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.184044 644063 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.184087 644063 usertrap_amd64.go:106] [ 971: 971] Map a usertrap vma at 66000 D0713 05:18:05.184155 644063 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc001b85890 1 D0713 05:18:05.184177 644063 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:05.184395 644063 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.184420 644063 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc001b85890 2 D0713 05:18:05.184431 644063 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:05.184834 644063 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.184875 644063 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc001b85890 3 D0713 05:18:05.184889 644063 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:05.192696 644063 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.192727 644063 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc001b85890 4 D0713 05:18:05.192739 644063 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:05.194477 644063 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.194503 644063 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc001b85890 5 D0713 05:18:05.194513 644063 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:05.194553 644063 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.194560 644063 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc001b85890 6 D0713 05:18:05.194568 644063 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:05.194789 644063 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.194810 644063 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc001b85890 7 D0713 05:18:05.194819 644063 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:05.194978 644063 usertrap_amd64.go:212] [ 971: 972] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.195001 644063 usertrap_amd64.go:122] [ 971: 972] Allocate a new trap: 0xc001b85890 8 D0713 05:18:05.195011 644063 usertrap_amd64.go:225] [ 971: 972] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:05.195236 644063 usertrap_amd64.go:212] [ 971: 972] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.195259 644063 usertrap_amd64.go:122] [ 971: 972] Allocate a new trap: 0xc001b85890 9 D0713 05:18:05.195270 644063 usertrap_amd64.go:225] [ 971: 972] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:05.195313 644063 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.195333 644063 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc001b85890 10 D0713 05:18:05.195380 644063 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:05.195521 644063 usertrap_amd64.go:212] [ 971: 972] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.195808 644063 usertrap_amd64.go:122] [ 971: 972] Allocate a new trap: 0xc001b85890 11 D0713 05:18:05.195831 644063 usertrap_amd64.go:225] [ 971: 972] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:05.198076 644063 usertrap_amd64.go:212] [ 971: 972] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.198103 644063 usertrap_amd64.go:122] [ 971: 972] Allocate a new trap: 0xc001b85890 12 D0713 05:18:05.198115 644063 usertrap_amd64.go:225] [ 971: 972] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:05.198184 644063 task_signals.go:470] [ 971: 974] Notified of signal 23 D0713 05:18:05.198206 644063 task_signals.go:179] [ 971: 974] Restarting syscall 202: interrupted by signal 23 D0713 05:18:05.198214 644063 task_signals.go:220] [ 971: 974] Signal 23: delivering to handler D0713 05:18:05.203500 644063 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.203530 644063 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc001b85890 13 D0713 05:18:05.203542 644063 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:05.208576 644063 task_signals.go:470] [ 971: 971] Notified of signal 23 D0713 05:18:05.208690 644063 task_signals.go:220] [ 971: 971] Signal 23: delivering to handler I0713 05:18:05.214738 644063 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0713 05:18:05.214834 644063 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.214857 644063 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc001b85890 14 D0713 05:18:05.214876 644063 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:05.214967 644063 task_exit.go:204] [ 971: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.214996 644063 task_exit.go:204] [ 971: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.215029 644063 task_signals.go:204] [ 971: 974] Signal 971, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.215060 644063 task_exit.go:204] [ 971: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.215070 644063 task_exit.go:204] [ 971: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.215075 644063 task_exit.go:204] [ 971: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.215068 644063 task_signals.go:204] [ 971: 973] Signal 971, PID: 973, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.215088 644063 task_exit.go:204] [ 971: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.215101 644063 task_exit.go:204] [ 971: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.215107 644063 task_exit.go:204] [ 971: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.215122 644063 task_signals.go:204] [ 971: 975] Signal 971, PID: 975, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.215133 644063 task_exit.go:204] [ 971: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.215140 644063 task_signals.go:204] [ 971: 972] Signal 971, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.215171 644063 task_exit.go:204] [ 971: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.215179 644063 task_exit.go:204] [ 971: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.215190 644063 task_exit.go:204] [ 971: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.216390 644063 task_exit.go:204] [ 971: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.216433 644063 task_exit.go:204] [ 971: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.216450 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.216548 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.216629 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.216828 644063 task_exit.go:204] [ 971: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.217431 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.218891 644063 syscalls.go:262] [ 976: 976] Allocating stack with size of 8388608 bytes D0713 05:18:05.219025 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.220234 644063 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.220262 644063 usertrap_amd64.go:106] [ 976: 976] Map a usertrap vma at 60000 D0713 05:18:05.220431 644063 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0009a35c0 1 D0713 05:18:05.220463 644063 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:05.220899 644063 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.220919 644063 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0009a35c0 2 D0713 05:18:05.220931 644063 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:05.221620 644063 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.221637 644063 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0009a35c0 3 D0713 05:18:05.221644 644063 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:05.227236 644063 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.227321 644063 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0009a35c0 4 D0713 05:18:05.227346 644063 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:05.229207 644063 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.229249 644063 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0009a35c0 5 D0713 05:18:05.229263 644063 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:05.229305 644063 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.229312 644063 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0009a35c0 6 D0713 05:18:05.229320 644063 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:05.229483 644063 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.229511 644063 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0009a35c0 7 D0713 05:18:05.229519 644063 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:05.229799 644063 usertrap_amd64.go:212] [ 976: 977] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.229826 644063 usertrap_amd64.go:122] [ 976: 977] Allocate a new trap: 0xc0009a35c0 8 D0713 05:18:05.229836 644063 usertrap_amd64.go:225] [ 976: 977] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:05.230271 644063 usertrap_amd64.go:212] [ 976: 977] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.230289 644063 usertrap_amd64.go:122] [ 976: 977] Allocate a new trap: 0xc0009a35c0 9 D0713 05:18:05.230300 644063 usertrap_amd64.go:225] [ 976: 977] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:05.230312 644063 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.230317 644063 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0009a35c0 10 D0713 05:18:05.230325 644063 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:05.239279 644063 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.239329 644063 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0009a35c0 11 D0713 05:18:05.239345 644063 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:05.241996 644063 usertrap_amd64.go:212] [ 976: 977] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.242029 644063 usertrap_amd64.go:122] [ 976: 977] Allocate a new trap: 0xc0009a35c0 12 D0713 05:18:05.242049 644063 usertrap_amd64.go:225] [ 976: 977] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:05.242142 644063 usertrap_amd64.go:212] [ 976: 977] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.242163 644063 usertrap_amd64.go:122] [ 976: 977] Allocate a new trap: 0xc0009a35c0 13 D0713 05:18:05.242173 644063 usertrap_amd64.go:225] [ 976: 977] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:05.243980 644063 task_signals.go:470] [ 976: 976] Notified of signal 23 D0713 05:18:05.244094 644063 task_signals.go:220] [ 976: 976] Signal 23: delivering to handler I0713 05:18:05.250440 644063 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0713 05:18:05.250636 644063 usertrap_amd64.go:212] [ 976: 976] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.250680 644063 usertrap_amd64.go:122] [ 976: 976] Allocate a new trap: 0xc0009a35c0 14 D0713 05:18:05.250724 644063 usertrap_amd64.go:225] [ 976: 976] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:05.250754 644063 task_exit.go:204] [ 976: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.250777 644063 task_exit.go:204] [ 976: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.250782 644063 task_signals.go:204] [ 976: 978] Signal 976, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.250806 644063 task_signals.go:204] [ 976: 980] Signal 976, PID: 980, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.250813 644063 task_signals.go:204] [ 976: 981] Signal 976, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.250812 644063 task_exit.go:204] [ 976: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.250802 644063 task_signals.go:204] [ 976: 977] Signal 976, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.250837 644063 task_exit.go:204] [ 976: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.250845 644063 task_exit.go:204] [ 976: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.250862 644063 task_signals.go:204] [ 976: 979] Signal 976, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.250874 644063 task_exit.go:204] [ 976: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.250882 644063 task_exit.go:204] [ 976: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.250888 644063 task_exit.go:204] [ 976: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.250899 644063 task_exit.go:204] [ 976: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.250907 644063 task_exit.go:204] [ 976: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.250913 644063 task_exit.go:204] [ 976: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.250923 644063 task_exit.go:204] [ 976: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.250938 644063 task_exit.go:204] [ 976: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.250964 644063 task_exit.go:204] [ 976: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.250976 644063 task_exit.go:204] [ 976: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.252868 644063 task_exit.go:204] [ 976: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.252895 644063 task_exit.go:204] [ 976: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.252907 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.253043 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.253105 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.253171 644063 task_exit.go:204] [ 976: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.253639 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.255334 644063 syscalls.go:262] [ 982: 982] Allocating stack with size of 8388608 bytes D0713 05:18:05.255450 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.258212 644063 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.258247 644063 usertrap_amd64.go:106] [ 982: 982] Map a usertrap vma at 61000 D0713 05:18:05.258368 644063 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001d1a5d0 1 D0713 05:18:05.258400 644063 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:05.258786 644063 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.258837 644063 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001d1a5d0 2 D0713 05:18:05.258852 644063 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:05.259583 644063 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.259609 644063 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001d1a5d0 3 D0713 05:18:05.259622 644063 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:05.268974 644063 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.269008 644063 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001d1a5d0 4 D0713 05:18:05.269023 644063 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:05.270462 644063 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.270500 644063 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001d1a5d0 5 D0713 05:18:05.270525 644063 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:05.270595 644063 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.270615 644063 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001d1a5d0 6 D0713 05:18:05.270624 644063 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:05.270998 644063 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.271020 644063 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001d1a5d0 7 D0713 05:18:05.271028 644063 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:05.271247 644063 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.271272 644063 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc001d1a5d0 8 D0713 05:18:05.271282 644063 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:05.271478 644063 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.271493 644063 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc001d1a5d0 9 D0713 05:18:05.271504 644063 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:05.271675 644063 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.271688 644063 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001d1a5d0 10 D0713 05:18:05.271697 644063 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:05.280214 644063 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.280240 644063 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001d1a5d0 11 D0713 05:18:05.280252 644063 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:05.285330 644063 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.285372 644063 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc001d1a5d0 12 D0713 05:18:05.285402 644063 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:05.285527 644063 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.285568 644063 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc001d1a5d0 13 D0713 05:18:05.285583 644063 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:05.285668 644063 task_signals.go:470] [ 982: 982] Notified of signal 23 D0713 05:18:05.285705 644063 task_signals.go:220] [ 982: 982] Signal 23: delivering to handler I0713 05:18:05.292849 644063 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0713 05:18:05.292927 644063 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.292965 644063 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc001d1a5d0 14 D0713 05:18:05.292994 644063 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:05.293023 644063 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.293047 644063 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.293068 644063 task_signals.go:204] [ 982: 983] Signal 982, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.293093 644063 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.293101 644063 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.293106 644063 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.293125 644063 task_signals.go:204] [ 982: 984] Signal 982, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.293136 644063 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.293144 644063 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.293149 644063 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.293161 644063 task_signals.go:204] [ 982: 985] Signal 982, PID: 985, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.293178 644063 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.293185 644063 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.293190 644063 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.293207 644063 task_signals.go:204] [ 982: 986] Signal 982, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.293229 644063 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.294479 644063 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.294511 644063 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.294523 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.294556 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.294564 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.294817 644063 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.295671 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.297309 644063 syscalls.go:262] [ 987: 987] Allocating stack with size of 8388608 bytes D0713 05:18:05.297427 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.298476 644063 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.298533 644063 usertrap_amd64.go:106] [ 987: 987] Map a usertrap vma at 6a000 D0713 05:18:05.298682 644063 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001b85c80 1 D0713 05:18:05.298724 644063 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:05.299115 644063 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.299201 644063 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001b85c80 2 D0713 05:18:05.299220 644063 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:05.300035 644063 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.300061 644063 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001b85c80 3 D0713 05:18:05.300072 644063 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:05.306760 644063 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.306811 644063 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001b85c80 4 D0713 05:18:05.306829 644063 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:05.307939 644063 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.307969 644063 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001b85c80 5 D0713 05:18:05.307982 644063 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:05.308054 644063 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.308074 644063 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001b85c80 6 D0713 05:18:05.308083 644063 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:05.308467 644063 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.308488 644063 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001b85c80 7 D0713 05:18:05.308496 644063 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:05.308689 644063 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.308707 644063 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc001b85c80 8 D0713 05:18:05.308716 644063 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:05.308872 644063 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.308903 644063 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc001b85c80 9 D0713 05:18:05.308933 644063 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:05.309021 644063 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.309041 644063 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001b85c80 10 D0713 05:18:05.309051 644063 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:05.317057 644063 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.317091 644063 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001b85c80 11 D0713 05:18:05.317103 644063 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:05.319320 644063 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.319348 644063 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc001b85c80 12 D0713 05:18:05.319360 644063 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:05.319412 644063 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.319416 644063 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc001b85c80 13 D0713 05:18:05.319422 644063 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:05.319435 644063 task_signals.go:470] [ 987: 987] Notified of signal 23 D0713 05:18:05.319561 644063 task_signals.go:220] [ 987: 987] Signal 23: delivering to handler D0713 05:18:05.327780 644063 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.327806 644063 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc001b85c80 14 D0713 05:18:05.327821 644063 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:05.327893 644063 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.327915 644063 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.327931 644063 task_signals.go:204] [ 987: 990] Signal 987, PID: 990, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.327946 644063 task_signals.go:204] [ 987: 991] Signal 987, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.327947 644063 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.327931 644063 task_signals.go:204] [ 987: 989] Signal 987, PID: 989, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.327960 644063 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.327970 644063 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.327991 644063 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.327996 644063 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.328010 644063 task_signals.go:204] [ 987: 988] Signal 987, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.328020 644063 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.328029 644063 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.328035 644063 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.328058 644063 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.328070 644063 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.329294 644063 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.329321 644063 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.329334 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.329394 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.329459 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.329545 644063 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.329665 644063 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 05:18:05.329736 644063 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 05:18:05.330263 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.331708 644063 syscalls.go:262] [ 992: 992] Allocating stack with size of 8388608 bytes D0713 05:18:05.331810 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.333593 644063 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.333638 644063 usertrap_amd64.go:106] [ 992: 992] Map a usertrap vma at 68000 D0713 05:18:05.333722 644063 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001eb1410 1 D0713 05:18:05.333762 644063 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:05.334335 644063 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.334358 644063 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001eb1410 2 D0713 05:18:05.334372 644063 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:05.335802 644063 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.335831 644063 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001eb1410 3 D0713 05:18:05.335844 644063 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:05.353411 644063 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.353452 644063 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001eb1410 4 D0713 05:18:05.353468 644063 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:05.361020 644063 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.361058 644063 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001eb1410 5 D0713 05:18:05.361082 644063 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:05.361406 644063 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.361437 644063 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001eb1410 6 D0713 05:18:05.361456 644063 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:05.361731 644063 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.361744 644063 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001eb1410 7 D0713 05:18:05.361752 644063 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:05.361924 644063 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.361936 644063 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc001eb1410 8 D0713 05:18:05.361946 644063 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:05.362722 644063 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.362744 644063 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc001eb1410 9 D0713 05:18:05.362757 644063 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:05.363449 644063 usertrap_amd64.go:212] [ 992: 994] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.363476 644063 usertrap_amd64.go:122] [ 992: 994] Allocate a new trap: 0xc001eb1410 10 D0713 05:18:05.363489 644063 usertrap_amd64.go:225] [ 992: 994] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:05.374178 644063 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.374220 644063 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc001eb1410 11 D0713 05:18:05.374236 644063 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:05.374280 644063 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.374288 644063 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc001eb1410 12 D0713 05:18:05.374295 644063 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:05.374312 644063 task_signals.go:470] [ 992: 992] Notified of signal 23 D0713 05:18:05.374396 644063 task_signals.go:220] [ 992: 992] Signal 23: delivering to handler D0713 05:18:05.375662 644063 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.375688 644063 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001eb1410 13 D0713 05:18:05.375697 644063 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:05.385254 644063 task_signals.go:470] [ 992: 992] Notified of signal 23 D0713 05:18:05.386631 644063 task_signals.go:220] [ 992: 992] Signal 23: delivering to handler D0713 05:18:05.386787 644063 task_signals.go:470] [ 992: 992] Notified of signal 23 D0713 05:18:05.386974 644063 task_signals.go:220] [ 992: 992] Signal 23: delivering to handler D0713 05:18:05.391817 644063 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.391857 644063 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc001eb1410 14 D0713 05:18:05.391872 644063 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:05.391941 644063 task_exit.go:204] [ 992: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.391962 644063 task_exit.go:204] [ 992: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.391990 644063 task_signals.go:204] [ 992: 995] Signal 992, PID: 995, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.391997 644063 task_signals.go:204] [ 992: 993] Signal 992, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.392024 644063 task_exit.go:204] [ 992: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.392039 644063 task_signals.go:204] [ 992: 996] Signal 992, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.392051 644063 task_signals.go:204] [ 992: 994] Signal 992, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.392076 644063 task_exit.go:204] [ 992: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.392095 644063 task_exit.go:204] [ 992: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.392109 644063 task_exit.go:204] [ 992: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.392117 644063 task_exit.go:204] [ 992: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.392122 644063 task_exit.go:204] [ 992: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.392130 644063 task_exit.go:204] [ 992: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.392139 644063 task_exit.go:204] [ 992: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.392144 644063 task_exit.go:204] [ 992: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.392168 644063 task_exit.go:204] [ 992: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.393368 644063 task_exit.go:204] [ 992: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.393397 644063 task_exit.go:204] [ 992: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.393410 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.393476 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.393492 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.393631 644063 task_exit.go:204] [ 992: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.394385 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.395713 644063 syscalls.go:262] [ 997: 997] Allocating stack with size of 8388608 bytes D0713 05:18:05.395811 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.411863 644063 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.411938 644063 usertrap_amd64.go:106] [ 997: 997] Map a usertrap vma at 66000 D0713 05:18:05.412098 644063 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc0009a3b90 1 D0713 05:18:05.412138 644063 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:05.412645 644063 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.412668 644063 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc0009a3b90 2 D0713 05:18:05.412679 644063 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:05.413340 644063 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.413373 644063 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc0009a3b90 3 D0713 05:18:05.413384 644063 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:05.420251 644063 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.420285 644063 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc0009a3b90 4 D0713 05:18:05.420297 644063 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:05.421418 644063 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.421448 644063 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc0009a3b90 5 D0713 05:18:05.421459 644063 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:05.421532 644063 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.421541 644063 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc0009a3b90 6 D0713 05:18:05.421549 644063 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:05.421792 644063 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.421817 644063 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc0009a3b90 7 D0713 05:18:05.421827 644063 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:05.422007 644063 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.422040 644063 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc0009a3b90 8 D0713 05:18:05.422053 644063 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:05.422272 644063 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.422298 644063 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc0009a3b90 9 D0713 05:18:05.422309 644063 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:05.422344 644063 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.422365 644063 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc0009a3b90 10 D0713 05:18:05.422375 644063 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:05.429996 644063 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.430031 644063 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc0009a3b90 11 D0713 05:18:05.430045 644063 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:05.432670 644063 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.432695 644063 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc0009a3b90 12 D0713 05:18:05.432705 644063 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:05.432739 644063 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.432746 644063 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc0009a3b90 13 D0713 05:18:05.432753 644063 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:05.432769 644063 task_signals.go:470] [ 997: 997] Notified of signal 23 D0713 05:18:05.432789 644063 task_signals.go:220] [ 997: 997] Signal 23: delivering to handler D0713 05:18:05.440226 644063 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.440258 644063 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc0009a3b90 14 D0713 05:18:05.440269 644063 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:05.440315 644063 task_exit.go:204] [ 997: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.440362 644063 task_signals.go:204] [ 997: 999] Signal 997, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.440380 644063 task_exit.go:204] [ 997: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.440401 644063 task_signals.go:204] [ 997: 998] Signal 997, PID: 998, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.440395 644063 task_signals.go:204] [ 997: 1002] Signal 997, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.440413 644063 task_signals.go:204] [ 997: 1001] Signal 997, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.440424 644063 task_exit.go:204] [ 997: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.440434 644063 task_signals.go:204] [ 997: 1000] Signal 997, PID: 1000, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.440441 644063 task_exit.go:204] [ 997: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.440445 644063 task_exit.go:204] [ 997: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.440453 644063 task_exit.go:204] [ 997: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.440468 644063 task_exit.go:204] [ 997: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.440472 644063 task_exit.go:204] [ 997: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.440481 644063 task_exit.go:204] [ 997: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.440486 644063 task_exit.go:204] [ 997: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.440489 644063 task_exit.go:204] [ 997: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.440507 644063 task_exit.go:204] [ 997: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.440512 644063 task_exit.go:204] [ 997: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.440515 644063 task_exit.go:204] [ 997: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.440521 644063 task_exit.go:204] [ 997: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.441830 644063 task_exit.go:204] [ 997: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.441855 644063 task_exit.go:204] [ 997: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.441868 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.441900 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.441912 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.442129 644063 task_exit.go:204] [ 997: 997] Transitioning from exit state TaskExitZombie to TaskExitDead I0713 05:18:05.442251 644063 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0713 05:18:05.442899 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.444293 644063 syscalls.go:262] [ 1003: 1003] Allocating stack with size of 8388608 bytes D0713 05:18:05.444402 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.445542 644063 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.445587 644063 usertrap_amd64.go:106] [ 1003: 1003] Map a usertrap vma at 69000 D0713 05:18:05.445668 644063 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc0002c0900 1 D0713 05:18:05.445702 644063 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:05.446037 644063 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.446063 644063 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc0002c0900 2 D0713 05:18:05.446076 644063 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:05.447119 644063 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.447148 644063 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc0002c0900 3 D0713 05:18:05.447159 644063 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:05.452935 644063 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.453015 644063 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc0002c0900 4 D0713 05:18:05.453031 644063 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:05.454658 644063 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.454688 644063 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc0002c0900 5 D0713 05:18:05.454703 644063 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:05.454768 644063 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.454785 644063 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc0002c0900 6 D0713 05:18:05.454794 644063 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:05.455090 644063 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.455108 644063 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc0002c0900 7 D0713 05:18:05.455118 644063 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:05.455294 644063 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.455312 644063 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc0002c0900 8 D0713 05:18:05.455322 644063 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:05.455528 644063 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.455550 644063 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc0002c0900 9 D0713 05:18:05.455561 644063 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:05.455640 644063 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.455657 644063 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc0002c0900 10 D0713 05:18:05.455670 644063 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:05.463747 644063 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.463816 644063 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc0002c0900 11 D0713 05:18:05.463865 644063 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:05.466544 644063 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.466579 644063 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc0002c0900 12 D0713 05:18:05.466595 644063 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:05.466641 644063 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.466659 644063 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc0002c0900 13 D0713 05:18:05.466668 644063 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:05.466757 644063 task_signals.go:470] [ 1003: 1003] Notified of signal 23 D0713 05:18:05.466859 644063 task_signals.go:220] [ 1003: 1003] Signal 23: delivering to handler I0713 05:18:05.475210 644063 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0713 05:18:05.475305 644063 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.475325 644063 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc0002c0900 14 D0713 05:18:05.475339 644063 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:05.475398 644063 task_exit.go:204] [ 1003: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.475435 644063 task_signals.go:204] [ 1003: 1004] Signal 1003, PID: 1004, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.475440 644063 task_signals.go:204] [ 1003: 1008] Signal 1003, PID: 1008, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.475457 644063 task_signals.go:204] [ 1003: 1006] Signal 1003, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.475471 644063 task_signals.go:204] [ 1003: 1005] Signal 1003, PID: 1005, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.475477 644063 task_signals.go:204] [ 1003: 1007] Signal 1003, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.475486 644063 task_exit.go:204] [ 1003: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.475503 644063 task_exit.go:204] [ 1003: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.475519 644063 task_exit.go:204] [ 1003: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.475538 644063 task_exit.go:204] [ 1003: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.475551 644063 task_exit.go:204] [ 1003: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.475566 644063 task_exit.go:204] [ 1003: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.475584 644063 task_exit.go:204] [ 1003: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.475595 644063 task_exit.go:204] [ 1003: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.475608 644063 task_exit.go:204] [ 1003: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.475614 644063 task_exit.go:204] [ 1003: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.475625 644063 task_exit.go:204] [ 1003: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.475639 644063 task_exit.go:204] [ 1003: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.475645 644063 task_exit.go:204] [ 1003: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.475655 644063 task_exit.go:204] [ 1003: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.476889 644063 task_exit.go:204] [ 1003: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.476918 644063 task_exit.go:204] [ 1003: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.476982 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.477020 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.477040 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.477100 644063 task_exit.go:204] [ 1003: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.477196 644063 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 05:18:05.477232 644063 task_signals.go:179] [ 6: 11] Restarting syscall 202: interrupted by signal 23 D0713 05:18:05.477242 644063 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 05:18:05.477687 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.479590 644063 syscalls.go:262] [ 1009: 1009] Allocating stack with size of 8388608 bytes D0713 05:18:05.479775 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.493596 644063 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.493647 644063 usertrap_amd64.go:106] [ 1009: 1009] Map a usertrap vma at 65000 D0713 05:18:05.493756 644063 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0002c0ab0 1 D0713 05:18:05.493790 644063 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:05.494178 644063 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.494199 644063 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0002c0ab0 2 D0713 05:18:05.494208 644063 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:05.494930 644063 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.494994 644063 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0002c0ab0 3 D0713 05:18:05.495010 644063 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:05.502746 644063 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.502791 644063 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0002c0ab0 4 D0713 05:18:05.502814 644063 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:05.504028 644063 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.504059 644063 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0002c0ab0 5 D0713 05:18:05.504073 644063 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:05.504115 644063 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.504128 644063 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0002c0ab0 6 D0713 05:18:05.504136 644063 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:05.504330 644063 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.504347 644063 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0002c0ab0 7 D0713 05:18:05.504355 644063 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:05.504612 644063 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.504642 644063 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0002c0ab0 8 D0713 05:18:05.504659 644063 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:05.504800 644063 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.504812 644063 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0002c0ab0 9 D0713 05:18:05.504822 644063 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:05.504891 644063 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.504914 644063 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0002c0ab0 10 D0713 05:18:05.504935 644063 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:05.505718 644063 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.505751 644063 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0002c0ab0 11 D0713 05:18:05.505767 644063 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:05.505959 644063 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.505973 644063 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0002c0ab0 12 D0713 05:18:05.505984 644063 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:05.506048 644063 task_signals.go:470] [ 1009: 1009] Notified of signal 23 D0713 05:18:05.506070 644063 task_signals.go:220] [ 1009: 1009] Signal 23: delivering to handler D0713 05:18:05.512873 644063 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.512902 644063 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0002c0ab0 13 D0713 05:18:05.512915 644063 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:05.516153 644063 task_signals.go:470] [ 1009: 1009] Notified of signal 23 D0713 05:18:05.516204 644063 task_signals.go:179] [ 1009: 1009] Restarting syscall 202: interrupted by signal 23 D0713 05:18:05.516232 644063 task_signals.go:220] [ 1009: 1009] Signal 23: delivering to handler I0713 05:18:05.524016 644063 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0713 05:18:05.524062 644063 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.524069 644063 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0002c0ab0 14 D0713 05:18:05.524080 644063 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:05.524110 644063 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.524122 644063 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.524137 644063 task_signals.go:204] [ 1009: 1012] Signal 1009, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.524159 644063 task_signals.go:204] [ 1009: 1014] Signal 1009, PID: 1014, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.524167 644063 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.524145 644063 task_signals.go:204] [ 1009: 1013] Signal 1009, PID: 1013, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.524180 644063 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.524185 644063 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.524172 644063 task_signals.go:204] [ 1009: 1010] Signal 1009, PID: 1010, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.524200 644063 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.524211 644063 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.524224 644063 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.524238 644063 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.524250 644063 task_signals.go:204] [ 1009: 1011] Signal 1009, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.524272 644063 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.524278 644063 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.524286 644063 task_exit.go:204] [ 1009: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.524293 644063 task_exit.go:204] [ 1009: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.524298 644063 task_exit.go:204] [ 1009: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.524307 644063 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.525531 644063 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.525560 644063 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.525570 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.525602 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.525611 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.525704 644063 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.525838 644063 task_signals.go:470] [ 6: 20] Notified of signal 23 D0713 05:18:05.525922 644063 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 05:18:05.526272 644063 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.527740 644063 syscalls.go:262] [ 1015: 1015] Allocating stack with size of 8388608 bytes D0713 05:18:05.527832 644063 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.529056 644063 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.529119 644063 usertrap_amd64.go:106] [ 1015: 1015] Map a usertrap vma at 60000 D0713 05:18:05.529204 644063 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00063c180 1 D0713 05:18:05.529241 644063 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:05.529611 644063 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.529642 644063 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00063c180 2 D0713 05:18:05.529674 644063 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:05.530334 644063 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.530368 644063 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00063c180 3 D0713 05:18:05.530383 644063 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:05.537259 644063 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.537287 644063 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00063c180 4 D0713 05:18:05.537299 644063 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:05.538381 644063 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.538419 644063 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00063c180 5 D0713 05:18:05.538430 644063 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:05.538511 644063 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.538525 644063 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00063c180 6 D0713 05:18:05.538534 644063 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:05.538832 644063 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.538861 644063 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00063c180 7 D0713 05:18:05.538875 644063 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:05.539043 644063 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.539081 644063 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc00063c180 8 D0713 05:18:05.539099 644063 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:05.539232 644063 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.539257 644063 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc00063c180 9 D0713 05:18:05.539268 644063 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:05.539480 644063 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.539494 644063 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00063c180 10 D0713 05:18:05.539503 644063 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:05.547206 644063 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.547235 644063 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00063c180 11 D0713 05:18:05.547250 644063 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:05.549796 644063 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.549823 644063 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc00063c180 12 D0713 05:18:05.549837 644063 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:05.549867 644063 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.549893 644063 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc00063c180 13 D0713 05:18:05.549908 644063 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:05.549955 644063 task_signals.go:470] [ 1015: 1015] Notified of signal 23 D0713 05:18:05.550027 644063 task_signals.go:220] [ 1015: 1015] Signal 23: delivering to handler D0713 05:18:05.559554 644063 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.559585 644063 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00063c180 14 D0713 05:18:05.559605 644063 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:05.559678 644063 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.559704 644063 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.559725 644063 task_signals.go:204] [ 1015: 1016] Signal 1015, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.559746 644063 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.559754 644063 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.559760 644063 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.559775 644063 task_signals.go:204] [ 1015: 1017] Signal 1015, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.559784 644063 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.559808 644063 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.559814 644063 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.559828 644063 task_signals.go:204] [ 1015: 1018] Signal 1015, PID: 1018, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.559847 644063 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.559854 644063 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.559859 644063 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.559878 644063 task_signals.go:204] [ 1015: 1019] Signal 1015, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.559896 644063 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.561068 644063 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.561102 644063 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.561115 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.561183 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.561195 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.561265 644063 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.561339 644063 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 05:18:05.561380 644063 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 05:18:05.561860 644063 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.563080 644063 syscalls.go:262] [ 1020: 1020] Allocating stack with size of 8388608 bytes D0713 05:18:05.563166 644063 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.564557 644063 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.564594 644063 usertrap_amd64.go:106] [ 1020: 1020] Map a usertrap vma at 65000 D0713 05:18:05.564910 644063 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc00063c480 1 D0713 05:18:05.565005 644063 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:05.565487 644063 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.565512 644063 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc00063c480 2 D0713 05:18:05.565522 644063 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:05.566164 644063 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.566268 644063 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc00063c480 3 D0713 05:18:05.566294 644063 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:05.573658 644063 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.573704 644063 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc00063c480 4 D0713 05:18:05.573720 644063 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:05.574870 644063 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.574905 644063 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc00063c480 5 D0713 05:18:05.574918 644063 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:05.575217 644063 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.575240 644063 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc00063c480 6 D0713 05:18:05.575248 644063 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:05.575496 644063 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.575514 644063 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc00063c480 7 D0713 05:18:05.575522 644063 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:05.575640 644063 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.575650 644063 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc00063c480 8 D0713 05:18:05.575665 644063 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:05.575821 644063 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.575836 644063 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc00063c480 9 D0713 05:18:05.575847 644063 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:05.575994 644063 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.576024 644063 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc00063c480 10 D0713 05:18:05.576036 644063 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:05.583362 644063 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.583393 644063 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc00063c480 11 D0713 05:18:05.583404 644063 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:05.586206 644063 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.586234 644063 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc00063c480 12 D0713 05:18:05.586246 644063 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:05.586390 644063 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.586430 644063 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc00063c480 13 D0713 05:18:05.586444 644063 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:05.586507 644063 task_signals.go:470] [ 1020: 1020] Notified of signal 23 D0713 05:18:05.586594 644063 task_signals.go:220] [ 1020: 1020] Signal 23: delivering to handler D0713 05:18:05.596105 644063 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.596202 644063 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc00063c480 14 D0713 05:18:05.596275 644063 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:05.596425 644063 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.596487 644063 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.596566 644063 task_signals.go:204] [ 1020: 1022] Signal 1020, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.596645 644063 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.596696 644063 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.596736 644063 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.596836 644063 task_signals.go:204] [ 1020: 1023] Signal 1020, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.596847 644063 task_signals.go:204] [ 1020: 1024] Signal 1020, PID: 1024, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.596857 644063 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.596824 644063 task_signals.go:204] [ 1020: 1021] Signal 1020, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.596869 644063 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.596879 644063 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.596891 644063 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.596900 644063 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.596905 644063 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.596914 644063 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.597974 644063 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.597998 644063 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.598011 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.599547 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.599572 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.599626 644063 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.600092 644063 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.601351 644063 syscalls.go:262] [ 1025: 1025] Allocating stack with size of 8388608 bytes D0713 05:18:05.601420 644063 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.602159 644063 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.602192 644063 usertrap_amd64.go:106] [ 1025: 1025] Map a usertrap vma at 6a000 D0713 05:18:05.602282 644063 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc00063c510 1 D0713 05:18:05.602315 644063 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:05.605253 644063 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.605291 644063 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc00063c510 2 D0713 05:18:05.605304 644063 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:05.613278 644063 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.613311 644063 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc00063c510 3 D0713 05:18:05.613324 644063 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:05.620675 644063 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.620707 644063 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc00063c510 4 D0713 05:18:05.620718 644063 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:05.622419 644063 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.622445 644063 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc00063c510 5 D0713 05:18:05.622456 644063 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:05.622498 644063 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.622515 644063 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc00063c510 6 D0713 05:18:05.622523 644063 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:05.622929 644063 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.622958 644063 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc00063c510 7 D0713 05:18:05.622969 644063 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:05.623719 644063 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.623740 644063 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc00063c510 8 D0713 05:18:05.623752 644063 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:05.624226 644063 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.624250 644063 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc00063c510 9 D0713 05:18:05.624261 644063 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:05.624615 644063 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.624639 644063 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc00063c510 10 D0713 05:18:05.624649 644063 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:05.632634 644063 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.632659 644063 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc00063c510 11 D0713 05:18:05.632672 644063 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:05.636710 644063 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.636746 644063 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc00063c510 12 D0713 05:18:05.636762 644063 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:05.636787 644063 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.636804 644063 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc00063c510 13 D0713 05:18:05.636816 644063 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:05.636854 644063 task_signals.go:470] [ 1025: 1025] Notified of signal 23 D0713 05:18:05.636986 644063 task_signals.go:220] [ 1025: 1025] Signal 23: delivering to handler D0713 05:18:05.642666 644063 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.642702 644063 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc00063c510 14 D0713 05:18:05.642715 644063 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:05.642792 644063 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.642825 644063 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.642848 644063 task_signals.go:204] [ 1025: 1029] Signal 1025, PID: 1029, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.642859 644063 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.642867 644063 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.642871 644063 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.642871 644063 task_signals.go:204] [ 1025: 1026] Signal 1025, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.642884 644063 task_signals.go:204] [ 1025: 1027] Signal 1025, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.642895 644063 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.642908 644063 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.642923 644063 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.642930 644063 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.642940 644063 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.642945 644063 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.642962 644063 task_signals.go:204] [ 1025: 1028] Signal 1025, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.642978 644063 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.644041 644063 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.644057 644063 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.644071 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.644117 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.644141 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.644228 644063 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.644873 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.646178 644063 syscalls.go:262] [ 1030: 1030] Allocating stack with size of 8388608 bytes D0713 05:18:05.646274 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.649781 644063 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.649830 644063 usertrap_amd64.go:106] [ 1030: 1030] Map a usertrap vma at 66000 D0713 05:18:05.649900 644063 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc001d1b8c0 1 D0713 05:18:05.649942 644063 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:05.650334 644063 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.650401 644063 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc001d1b8c0 2 D0713 05:18:05.650419 644063 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:05.651240 644063 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.651265 644063 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc001d1b8c0 3 D0713 05:18:05.651275 644063 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:05.657843 644063 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.657888 644063 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc001d1b8c0 4 D0713 05:18:05.657904 644063 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:05.659123 644063 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.659155 644063 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc001d1b8c0 5 D0713 05:18:05.659169 644063 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:05.659642 644063 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.659670 644063 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc001d1b8c0 6 D0713 05:18:05.659682 644063 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:05.660156 644063 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.660181 644063 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc001d1b8c0 7 D0713 05:18:05.660191 644063 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:05.660450 644063 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.660474 644063 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc001d1b8c0 8 D0713 05:18:05.660485 644063 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:05.660814 644063 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.660839 644063 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc001d1b8c0 9 D0713 05:18:05.660848 644063 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:05.660870 644063 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.660877 644063 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc001d1b8c0 10 D0713 05:18:05.660888 644063 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:05.671193 644063 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.671218 644063 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc001d1b8c0 11 D0713 05:18:05.671228 644063 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:05.671250 644063 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.671256 644063 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc001d1b8c0 12 D0713 05:18:05.671263 644063 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:05.671305 644063 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.671312 644063 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc001d1b8c0 13 D0713 05:18:05.671318 644063 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:05.671336 644063 task_signals.go:470] [ 1030: 1030] Notified of signal 23 D0713 05:18:05.671374 644063 task_signals.go:220] [ 1030: 1030] Signal 23: delivering to handler D0713 05:18:05.681653 644063 task_signals.go:470] [ 1030: 1030] Notified of signal 23 D0713 05:18:05.685180 644063 task_signals.go:220] [ 1030: 1030] Signal 23: delivering to handler D0713 05:18:05.692842 644063 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.692986 644063 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc001d1b8c0 14 D0713 05:18:05.693014 644063 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:05.693089 644063 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.693133 644063 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.693167 644063 task_signals.go:204] [ 1030: 1033] Signal 1030, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.693154 644063 task_signals.go:204] [ 1030: 1032] Signal 1030, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.693194 644063 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.693233 644063 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.693256 644063 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.693277 644063 task_signals.go:204] [ 1030: 1034] Signal 1030, PID: 1034, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.693293 644063 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.693302 644063 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.693308 644063 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.693321 644063 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.693343 644063 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.693349 644063 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.693364 644063 task_signals.go:204] [ 1030: 1031] Signal 1030, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.693380 644063 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.694697 644063 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.694734 644063 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.694748 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.695672 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.695703 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.696728 644063 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.697542 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.698857 644063 syscalls.go:262] [ 1035: 1035] Allocating stack with size of 8388608 bytes D0713 05:18:05.698933 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.702591 644063 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.702646 644063 usertrap_amd64.go:106] [ 1035: 1035] Map a usertrap vma at 62000 D0713 05:18:05.702766 644063 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00063fd40 1 D0713 05:18:05.702808 644063 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:05.703237 644063 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.703265 644063 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00063fd40 2 D0713 05:18:05.703279 644063 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:05.703704 644063 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.703733 644063 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00063fd40 3 D0713 05:18:05.703743 644063 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:05.708320 644063 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.708359 644063 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00063fd40 4 D0713 05:18:05.708372 644063 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:05.709501 644063 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.709524 644063 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00063fd40 5 D0713 05:18:05.709534 644063 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:05.709589 644063 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.709598 644063 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00063fd40 6 D0713 05:18:05.709606 644063 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:05.710050 644063 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.710067 644063 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00063fd40 7 D0713 05:18:05.710078 644063 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:05.710266 644063 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.710283 644063 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc00063fd40 8 D0713 05:18:05.710299 644063 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:05.710479 644063 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.710510 644063 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc00063fd40 9 D0713 05:18:05.710525 644063 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:05.710588 644063 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.710615 644063 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00063fd40 10 D0713 05:18:05.710624 644063 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:05.717766 644063 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.717804 644063 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00063fd40 11 D0713 05:18:05.717816 644063 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:05.722503 644063 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.722570 644063 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc00063fd40 12 D0713 05:18:05.722630 644063 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:05.724257 644063 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.724306 644063 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc00063fd40 13 D0713 05:18:05.724322 644063 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:05.724393 644063 task_signals.go:470] [ 1035: 1035] Notified of signal 23 D0713 05:18:05.724463 644063 task_signals.go:220] [ 1035: 1035] Signal 23: delivering to handler D0713 05:18:05.728427 644063 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.728471 644063 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00063fd40 14 D0713 05:18:05.728487 644063 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:05.728542 644063 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.728581 644063 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.728619 644063 task_signals.go:204] [ 1035: 1036] Signal 1035, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.728655 644063 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.728675 644063 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.728689 644063 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.728709 644063 task_signals.go:204] [ 1035: 1037] Signal 1035, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.728734 644063 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.728742 644063 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.728747 644063 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.728764 644063 task_signals.go:204] [ 1035: 1038] Signal 1035, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.728785 644063 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.728793 644063 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.728812 644063 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.728827 644063 task_signals.go:204] [ 1035: 1039] Signal 1035, PID: 1039, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.728836 644063 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.730026 644063 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.730061 644063 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.730080 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.730107 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.730115 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.730212 644063 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.730904 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.732271 644063 syscalls.go:262] [ 1040: 1040] Allocating stack with size of 8388608 bytes D0713 05:18:05.732408 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.734429 644063 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.734476 644063 usertrap_amd64.go:106] [ 1040: 1040] Map a usertrap vma at 65000 D0713 05:18:05.734652 644063 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc00184c8a0 1 D0713 05:18:05.734694 644063 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:05.735044 644063 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.735075 644063 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc00184c8a0 2 D0713 05:18:05.735088 644063 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:05.735790 644063 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.735820 644063 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc00184c8a0 3 D0713 05:18:05.735832 644063 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:05.742503 644063 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.742545 644063 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc00184c8a0 4 D0713 05:18:05.742566 644063 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:05.745748 644063 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.745796 644063 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc00184c8a0 5 D0713 05:18:05.745816 644063 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:05.745879 644063 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.745897 644063 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc00184c8a0 6 D0713 05:18:05.745905 644063 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:05.746109 644063 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.746124 644063 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc00184c8a0 7 D0713 05:18:05.746132 644063 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:05.746278 644063 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.746306 644063 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc00184c8a0 8 D0713 05:18:05.746318 644063 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:05.746536 644063 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.746602 644063 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc00184c8a0 9 D0713 05:18:05.746637 644063 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:05.746795 644063 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.746822 644063 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc00184c8a0 10 D0713 05:18:05.746836 644063 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:05.748673 644063 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.748693 644063 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc00184c8a0 11 D0713 05:18:05.748704 644063 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:05.748742 644063 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.748755 644063 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc00184c8a0 12 D0713 05:18:05.748765 644063 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:05.748781 644063 task_signals.go:470] [ 1040: 1040] Notified of signal 23 D0713 05:18:05.748857 644063 task_signals.go:220] [ 1040: 1040] Signal 23: delivering to handler D0713 05:18:05.755450 644063 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.755491 644063 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc00184c8a0 13 D0713 05:18:05.755504 644063 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:05.760029 644063 task_signals.go:470] [ 1040: 1040] Notified of signal 23 D0713 05:18:05.760074 644063 task_signals.go:179] [ 1040: 1040] Restarting syscall 202: interrupted by signal 23 D0713 05:18:05.760102 644063 task_signals.go:220] [ 1040: 1040] Signal 23: delivering to handler D0713 05:18:05.765927 644063 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.765951 644063 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc00184c8a0 14 D0713 05:18:05.765964 644063 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:05.766032 644063 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.766057 644063 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.766085 644063 task_signals.go:204] [ 1040: 1041] Signal 1040, PID: 1041, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.766101 644063 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.766119 644063 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.766131 644063 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.766152 644063 task_signals.go:204] [ 1040: 1042] Signal 1040, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.766175 644063 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.766183 644063 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.766188 644063 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.766203 644063 task_signals.go:204] [ 1040: 1043] Signal 1040, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.766220 644063 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.766228 644063 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.766233 644063 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.766249 644063 task_signals.go:204] [ 1040: 1044] Signal 1040, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.766266 644063 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.767483 644063 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.767513 644063 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.767526 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.768697 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.768730 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.768857 644063 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.769474 644063 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.770834 644063 syscalls.go:262] [ 1045: 1045] Allocating stack with size of 8388608 bytes D0713 05:18:05.770909 644063 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.771911 644063 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.771966 644063 usertrap_amd64.go:106] [ 1045: 1045] Map a usertrap vma at 6a000 D0713 05:18:05.772114 644063 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00063cab0 1 D0713 05:18:05.772158 644063 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:05.772625 644063 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.772650 644063 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00063cab0 2 D0713 05:18:05.772660 644063 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:05.773512 644063 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.773539 644063 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00063cab0 3 D0713 05:18:05.773550 644063 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:05.778610 644063 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.778649 644063 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00063cab0 4 D0713 05:18:05.778683 644063 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:05.779725 644063 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.779753 644063 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00063cab0 5 D0713 05:18:05.779763 644063 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:05.779799 644063 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.779807 644063 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00063cab0 6 D0713 05:18:05.779814 644063 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:05.779993 644063 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.780016 644063 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00063cab0 7 D0713 05:18:05.780023 644063 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:05.780270 644063 usertrap_amd64.go:212] [ 1045: 1047] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.780297 644063 usertrap_amd64.go:122] [ 1045: 1047] Allocate a new trap: 0xc00063cab0 8 D0713 05:18:05.780306 644063 usertrap_amd64.go:225] [ 1045: 1047] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:05.780532 644063 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.780566 644063 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00063cab0 9 D0713 05:18:05.780577 644063 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:05.780658 644063 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.780692 644063 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc00063cab0 10 D0713 05:18:05.780705 644063 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:05.787950 644063 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.787987 644063 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00063cab0 11 D0713 05:18:05.787999 644063 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:05.791532 644063 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.791573 644063 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc00063cab0 12 D0713 05:18:05.791587 644063 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:05.791613 644063 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.791631 644063 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc00063cab0 13 D0713 05:18:05.791647 644063 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:05.791735 644063 task_signals.go:470] [ 1045: 1045] Notified of signal 23 D0713 05:18:05.791794 644063 task_signals.go:220] [ 1045: 1045] Signal 23: delivering to handler D0713 05:18:05.797861 644063 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.797898 644063 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc00063cab0 14 D0713 05:18:05.797912 644063 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:05.797974 644063 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.798013 644063 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.798031 644063 task_signals.go:204] [ 1045: 1047] Signal 1045, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.798026 644063 task_signals.go:204] [ 1045: 1046] Signal 1045, PID: 1046, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.798044 644063 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.798046 644063 task_signals.go:204] [ 1045: 1049] Signal 1045, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.798053 644063 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.798100 644063 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.798111 644063 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.798129 644063 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.798145 644063 task_signals.go:204] [ 1045: 1048] Signal 1045, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.798159 644063 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.798176 644063 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.798191 644063 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.798199 644063 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.798209 644063 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.799338 644063 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.799381 644063 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.799395 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.799431 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.799445 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.799868 644063 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.800440 644063 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.803678 644063 syscalls.go:262] [ 1050: 1050] Allocating stack with size of 8388608 bytes D0713 05:18:05.803992 644063 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.805141 644063 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.805226 644063 usertrap_amd64.go:106] [ 1050: 1050] Map a usertrap vma at 66000 D0713 05:18:05.805313 644063 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc001d1bcb0 1 D0713 05:18:05.805340 644063 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:05.806407 644063 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.806432 644063 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc001d1bcb0 2 D0713 05:18:05.806449 644063 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:05.807268 644063 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.807292 644063 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc001d1bcb0 3 D0713 05:18:05.807301 644063 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:05.812969 644063 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.812994 644063 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc001d1bcb0 4 D0713 05:18:05.813012 644063 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:05.814359 644063 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.814425 644063 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc001d1bcb0 5 D0713 05:18:05.814437 644063 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:05.814479 644063 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.814486 644063 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc001d1bcb0 6 D0713 05:18:05.814500 644063 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:05.815646 644063 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.815686 644063 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc001d1bcb0 7 D0713 05:18:05.815705 644063 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:05.816074 644063 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.816102 644063 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc001d1bcb0 8 D0713 05:18:05.816115 644063 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:05.816342 644063 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.816363 644063 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc001d1bcb0 9 D0713 05:18:05.816371 644063 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:05.816575 644063 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.816599 644063 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc001d1bcb0 10 D0713 05:18:05.816608 644063 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:05.817107 644063 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.817137 644063 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc001d1bcb0 11 D0713 05:18:05.817152 644063 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:05.817305 644063 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.817328 644063 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc001d1bcb0 12 D0713 05:18:05.817338 644063 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:05.817374 644063 task_signals.go:470] [ 1050: 1050] Notified of signal 23 D0713 05:18:05.817424 644063 task_signals.go:220] [ 1050: 1050] Signal 23: delivering to handler D0713 05:18:05.823817 644063 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.823849 644063 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc001d1bcb0 13 D0713 05:18:05.823868 644063 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:05.827659 644063 task_signals.go:470] [ 1050: 1050] Notified of signal 23 D0713 05:18:05.827721 644063 task_signals.go:220] [ 1050: 1050] Signal 23: delivering to handler I0713 05:18:05.834261 644063 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0713 05:18:05.834361 644063 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.834374 644063 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc001d1bcb0 14 D0713 05:18:05.834390 644063 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:05.834456 644063 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.834496 644063 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.834544 644063 task_signals.go:204] [ 1050: 1054] Signal 1050, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.834570 644063 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.834567 644063 task_signals.go:204] [ 1050: 1052] Signal 1050, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.834585 644063 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.834592 644063 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.834553 644063 task_signals.go:204] [ 1050: 1053] Signal 1050, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.834524 644063 task_signals.go:204] [ 1050: 1051] Signal 1050, PID: 1051, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.834604 644063 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.834629 644063 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.834664 644063 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.834680 644063 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.834689 644063 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.834695 644063 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.834710 644063 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.835904 644063 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.835927 644063 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.835990 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.836050 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.836067 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.836143 644063 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.836737 644063 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.838296 644063 syscalls.go:262] [ 1055: 1055] Allocating stack with size of 8388608 bytes D0713 05:18:05.838415 644063 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.839297 644063 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.839320 644063 usertrap_amd64.go:106] [ 1055: 1055] Map a usertrap vma at 60000 D0713 05:18:05.839402 644063 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc0012b6b40 1 D0713 05:18:05.839432 644063 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:05.839678 644063 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.839701 644063 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc0012b6b40 2 D0713 05:18:05.839710 644063 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:05.843283 644063 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.843386 644063 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc0012b6b40 3 D0713 05:18:05.843405 644063 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:05.848659 644063 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.848702 644063 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc0012b6b40 4 D0713 05:18:05.848717 644063 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:05.849912 644063 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.849970 644063 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc0012b6b40 5 D0713 05:18:05.849986 644063 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:05.850035 644063 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.850051 644063 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc0012b6b40 6 D0713 05:18:05.850056 644063 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:05.850246 644063 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.850264 644063 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc0012b6b40 7 D0713 05:18:05.850272 644063 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:05.850418 644063 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.850439 644063 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc0012b6b40 8 D0713 05:18:05.850449 644063 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:05.850616 644063 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.850640 644063 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc0012b6b40 9 D0713 05:18:05.850651 644063 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:05.850688 644063 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.850696 644063 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc0012b6b40 10 D0713 05:18:05.850710 644063 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:05.857943 644063 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.857976 644063 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc0012b6b40 11 D0713 05:18:05.857986 644063 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:05.861035 644063 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.861069 644063 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc0012b6b40 12 D0713 05:18:05.861088 644063 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:05.861123 644063 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.861138 644063 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc0012b6b40 13 D0713 05:18:05.861144 644063 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:05.861175 644063 task_signals.go:470] [ 1055: 1055] Notified of signal 23 D0713 05:18:05.861219 644063 task_signals.go:220] [ 1055: 1055] Signal 23: delivering to handler I0713 05:18:05.870912 644063 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0713 05:18:05.871017 644063 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.871030 644063 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc0012b6b40 14 D0713 05:18:05.871043 644063 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:05.871112 644063 task_exit.go:204] [ 1055: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.871136 644063 task_exit.go:204] [ 1055: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.871151 644063 task_signals.go:204] [ 1055: 1057] Signal 1055, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.871165 644063 task_signals.go:204] [ 1055: 1058] Signal 1055, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.871167 644063 task_signals.go:204] [ 1055: 1056] Signal 1055, PID: 1056, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.871179 644063 task_exit.go:204] [ 1055: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.871194 644063 task_exit.go:204] [ 1055: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.871202 644063 task_exit.go:204] [ 1055: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.871299 644063 task_signals.go:204] [ 1055: 1059] Signal 1055, PID: 1059, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.871312 644063 task_exit.go:204] [ 1055: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.871338 644063 task_exit.go:204] [ 1055: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.871343 644063 task_exit.go:204] [ 1055: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.871353 644063 task_exit.go:204] [ 1055: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.871359 644063 task_exit.go:204] [ 1055: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.871363 644063 task_exit.go:204] [ 1055: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.871368 644063 task_exit.go:204] [ 1055: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.872640 644063 task_exit.go:204] [ 1055: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.872697 644063 task_exit.go:204] [ 1055: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.872715 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.872754 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.872767 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.872892 644063 task_exit.go:204] [ 1055: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.873129 644063 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 05:18:05.873167 644063 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 05:18:05.873646 644063 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.875131 644063 syscalls.go:262] [ 1060: 1060] Allocating stack with size of 8388608 bytes D0713 05:18:05.875245 644063 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.876623 644063 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.876663 644063 usertrap_amd64.go:106] [ 1060: 1060] Map a usertrap vma at 63000 D0713 05:18:05.876754 644063 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc00063d140 1 D0713 05:18:05.876784 644063 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:05.877544 644063 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.877579 644063 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc00063d140 2 D0713 05:18:05.877595 644063 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:05.878240 644063 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.878267 644063 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc00063d140 3 D0713 05:18:05.878280 644063 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:05.884773 644063 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.884805 644063 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc00063d140 4 D0713 05:18:05.884818 644063 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:05.886569 644063 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.886598 644063 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc00063d140 5 D0713 05:18:05.886612 644063 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:05.886660 644063 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.886669 644063 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc00063d140 6 D0713 05:18:05.886676 644063 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:05.887187 644063 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.887252 644063 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc00063d140 7 D0713 05:18:05.887271 644063 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:05.887530 644063 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.887547 644063 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc00063d140 8 D0713 05:18:05.887560 644063 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:05.887719 644063 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.887746 644063 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc00063d140 9 D0713 05:18:05.887761 644063 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:05.888083 644063 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.888140 644063 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc00063d140 10 D0713 05:18:05.888556 644063 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:05.895864 644063 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.895908 644063 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc00063d140 11 D0713 05:18:05.895923 644063 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:05.898737 644063 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.898777 644063 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc00063d140 12 D0713 05:18:05.898793 644063 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:05.898861 644063 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.898883 644063 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc00063d140 13 D0713 05:18:05.898892 644063 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:05.898936 644063 task_signals.go:470] [ 1060: 1060] Notified of signal 23 D0713 05:18:05.898962 644063 task_signals.go:220] [ 1060: 1060] Signal 23: delivering to handler I0713 05:18:05.906565 644063 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0713 05:18:05.906664 644063 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.906678 644063 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc00063d140 14 D0713 05:18:05.906690 644063 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:05.906734 644063 task_exit.go:204] [ 1060: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.906771 644063 task_exit.go:204] [ 1060: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.906769 644063 task_signals.go:204] [ 1060: 1063] Signal 1060, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.906806 644063 task_exit.go:204] [ 1060: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.906821 644063 task_signals.go:204] [ 1060: 1064] Signal 1060, PID: 1064, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.906805 644063 task_signals.go:204] [ 1060: 1062] Signal 1060, PID: 1062, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.906833 644063 task_signals.go:204] [ 1060: 1061] Signal 1060, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.906846 644063 task_exit.go:204] [ 1060: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.906851 644063 task_exit.go:204] [ 1060: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.906871 644063 task_exit.go:204] [ 1060: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.906879 644063 task_exit.go:204] [ 1060: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.906884 644063 task_exit.go:204] [ 1060: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.906894 644063 task_exit.go:204] [ 1060: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.906901 644063 task_exit.go:204] [ 1060: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.906906 644063 task_exit.go:204] [ 1060: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.906916 644063 task_exit.go:204] [ 1060: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.908181 644063 task_exit.go:204] [ 1060: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.908220 644063 task_exit.go:204] [ 1060: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.908234 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.908296 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.908320 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.908499 644063 task_exit.go:204] [ 1060: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.909173 644063 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.910683 644063 syscalls.go:262] [ 1065: 1065] Allocating stack with size of 8388608 bytes D0713 05:18:05.910791 644063 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.911947 644063 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.911997 644063 usertrap_amd64.go:106] [ 1065: 1065] Map a usertrap vma at 67000 D0713 05:18:05.912100 644063 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc00063d3e0 1 D0713 05:18:05.912130 644063 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:05.912517 644063 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.912563 644063 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc00063d3e0 2 D0713 05:18:05.912580 644063 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:05.913213 644063 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.913243 644063 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc00063d3e0 3 D0713 05:18:05.913256 644063 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:05.920751 644063 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.920803 644063 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc00063d3e0 4 D0713 05:18:05.920822 644063 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:05.922315 644063 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.922345 644063 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc00063d3e0 5 D0713 05:18:05.922362 644063 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:05.923252 644063 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.923281 644063 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc00063d3e0 6 D0713 05:18:05.923294 644063 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:05.923529 644063 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.923564 644063 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc00063d3e0 7 D0713 05:18:05.923574 644063 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:05.923797 644063 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.923806 644063 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc00063d3e0 8 D0713 05:18:05.923812 644063 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:05.924050 644063 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.924095 644063 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc00063d3e0 9 D0713 05:18:05.924112 644063 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:05.924145 644063 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.924154 644063 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc00063d3e0 10 D0713 05:18:05.924162 644063 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:05.933845 644063 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.933880 644063 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc00063d3e0 11 D0713 05:18:05.933895 644063 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:05.934549 644063 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.934581 644063 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc00063d3e0 12 D0713 05:18:05.934595 644063 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:05.936521 644063 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.936553 644063 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc00063d3e0 13 D0713 05:18:05.936562 644063 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:05.936630 644063 task_signals.go:470] [ 1065: 1065] Notified of signal 23 D0713 05:18:05.936718 644063 task_signals.go:220] [ 1065: 1065] Signal 23: delivering to handler I0713 05:18:05.944005 644063 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0713 05:18:05.944132 644063 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.944160 644063 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc00063d3e0 14 D0713 05:18:05.944177 644063 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:05.944244 644063 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.944285 644063 task_signals.go:204] [ 1065: 1068] Signal 1065, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.944316 644063 task_signals.go:204] [ 1065: 1067] Signal 1065, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.944328 644063 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.944346 644063 task_signals.go:204] [ 1065: 1070] Signal 1065, PID: 1070, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.944359 644063 task_signals.go:204] [ 1065: 1069] Signal 1065, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.944367 644063 task_exit.go:204] [ 1065: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.944375 644063 task_exit.go:204] [ 1065: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.944380 644063 task_exit.go:204] [ 1065: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.944406 644063 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.944442 644063 task_signals.go:204] [ 1065: 1066] Signal 1065, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.944455 644063 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.944461 644063 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.944472 644063 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.944489 644063 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.944495 644063 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.944524 644063 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.944544 644063 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.944551 644063 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.944561 644063 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.945981 644063 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.946031 644063 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.946049 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.946113 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.946125 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.946317 644063 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.946830 644063 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.948152 644063 syscalls.go:262] [ 1071: 1071] Allocating stack with size of 8388608 bytes D0713 05:18:05.948268 644063 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.951680 644063 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.951750 644063 usertrap_amd64.go:106] [ 1071: 1071] Map a usertrap vma at 62000 D0713 05:18:05.951862 644063 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00063d5f0 1 D0713 05:18:05.951891 644063 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:05.952280 644063 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.952310 644063 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00063d5f0 2 D0713 05:18:05.952324 644063 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:05.953149 644063 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.953176 644063 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00063d5f0 3 D0713 05:18:05.953190 644063 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:05.962388 644063 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.962433 644063 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00063d5f0 4 D0713 05:18:05.962449 644063 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:05.963854 644063 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.963882 644063 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00063d5f0 5 D0713 05:18:05.963893 644063 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:05.963945 644063 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.963953 644063 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00063d5f0 6 D0713 05:18:05.963960 644063 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:05.964130 644063 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.964150 644063 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00063d5f0 7 D0713 05:18:05.964157 644063 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:05.964390 644063 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.964419 644063 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc00063d5f0 8 D0713 05:18:05.964430 644063 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:05.964604 644063 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.964627 644063 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc00063d5f0 9 D0713 05:18:05.964637 644063 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:05.964648 644063 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.964655 644063 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00063d5f0 10 D0713 05:18:05.964664 644063 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:05.972179 644063 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.972214 644063 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00063d5f0 11 D0713 05:18:05.972226 644063 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:05.975819 644063 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.975851 644063 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc00063d5f0 12 D0713 05:18:05.975881 644063 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:05.976665 644063 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.976693 644063 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc00063d5f0 13 D0713 05:18:05.976705 644063 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:05.976739 644063 task_signals.go:470] [ 1071: 1071] Notified of signal 23 D0713 05:18:05.976861 644063 task_signals.go:220] [ 1071: 1071] Signal 23: delivering to handler D0713 05:18:05.982284 644063 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.982319 644063 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc00063d5f0 14 D0713 05:18:05.982332 644063 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:05.982400 644063 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.982457 644063 task_signals.go:204] [ 1071: 1072] Signal 1071, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.982490 644063 task_signals.go:204] [ 1071: 1075] Signal 1071, PID: 1075, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.982508 644063 task_signals.go:204] [ 1071: 1074] Signal 1071, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.982522 644063 task_signals.go:204] [ 1071: 1073] Signal 1071, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.982533 644063 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.982550 644063 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.982569 644063 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.982576 644063 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.982587 644063 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.982607 644063 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.982613 644063 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.982624 644063 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.982632 644063 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.982647 644063 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.982657 644063 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.983774 644063 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.983811 644063 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.983826 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.983862 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.983873 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.984017 644063 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.984690 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.986287 644063 syscalls.go:262] [ 1076: 1076] Allocating stack with size of 8388608 bytes D0713 05:18:05.986389 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.987567 644063 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.987595 644063 usertrap_amd64.go:106] [ 1076: 1076] Map a usertrap vma at 6a000 D0713 05:18:05.987740 644063 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc0007606f0 1 D0713 05:18:05.987890 644063 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:05.988434 644063 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.988448 644063 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc0007606f0 2 D0713 05:18:05.988458 644063 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:05.989007 644063 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.989035 644063 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc0007606f0 3 D0713 05:18:05.989046 644063 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:05.995108 644063 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.995144 644063 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc0007606f0 4 D0713 05:18:05.995157 644063 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:05.996457 644063 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.996561 644063 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc0007606f0 5 D0713 05:18:05.996621 644063 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:05.996749 644063 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.996815 644063 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc0007606f0 6 D0713 05:18:05.996892 644063 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:05.997180 644063 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.997201 644063 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc0007606f0 7 D0713 05:18:05.997211 644063 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:05.997473 644063 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.997544 644063 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc0007606f0 8 D0713 05:18:05.997607 644063 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:05.998002 644063 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.998014 644063 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc0007606f0 9 D0713 05:18:05.998023 644063 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:05.998354 644063 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.998513 644063 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc0007606f0 10 D0713 05:18:05.998584 644063 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b020 trap addr 6a320 ([184 39 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:05.998644 644063 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.998654 644063 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc0007606f0 11 D0713 05:18:05.998662 644063 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b57c trap addr 6a370 ([184 202 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:05.998673 644063 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.998688 644063 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc0007606f0 12 D0713 05:18:05.998700 644063 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:05.998718 644063 task_signals.go:470] [ 1076: 1076] Notified of signal 23 D0713 05:18:05.998760 644063 task_signals.go:220] [ 1076: 1076] Signal 23: delivering to handler D0713 05:18:06.006785 644063 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.006832 644063 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc0007606f0 13 D0713 05:18:06.006849 644063 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:06.009353 644063 task_signals.go:470] [ 1076: 1076] Notified of signal 23 D0713 05:18:06.009441 644063 task_signals.go:220] [ 1076: 1076] Signal 23: delivering to handler D0713 05:18:06.018031 644063 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.018082 644063 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc0007606f0 14 D0713 05:18:06.018099 644063 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:06.018166 644063 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.018200 644063 task_signals.go:204] [ 1076: 1078] Signal 1076, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.018235 644063 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.018253 644063 task_signals.go:204] [ 1076: 1080] Signal 1076, PID: 1080, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.018262 644063 task_signals.go:204] [ 1076: 1079] Signal 1076, PID: 1079, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.018269 644063 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.018277 644063 task_signals.go:204] [ 1076: 1077] Signal 1076, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.018284 644063 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.018288 644063 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.018312 644063 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.018327 644063 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.018331 644063 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.018340 644063 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.018349 644063 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.018354 644063 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.018365 644063 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.020601 644063 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.020633 644063 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.020654 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.020701 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.020727 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.020795 644063 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.021656 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.023014 644063 syscalls.go:262] [ 1081: 1081] Allocating stack with size of 8388608 bytes D0713 05:18:06.023110 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.024191 644063 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.024235 644063 usertrap_amd64.go:106] [ 1081: 1081] Map a usertrap vma at 66000 D0713 05:18:06.024311 644063 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc000760810 1 D0713 05:18:06.024334 644063 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:06.024623 644063 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.024650 644063 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc000760810 2 D0713 05:18:06.024661 644063 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:06.025212 644063 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.025245 644063 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc000760810 3 D0713 05:18:06.025257 644063 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:06.032894 644063 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.032967 644063 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc000760810 4 D0713 05:18:06.032985 644063 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:06.034285 644063 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.034315 644063 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc000760810 5 D0713 05:18:06.034326 644063 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:06.034361 644063 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.034366 644063 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc000760810 6 D0713 05:18:06.034372 644063 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:06.034570 644063 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.034607 644063 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc000760810 7 D0713 05:18:06.034617 644063 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:06.034787 644063 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.034821 644063 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc000760810 8 D0713 05:18:06.034832 644063 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:06.035168 644063 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.035195 644063 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc000760810 9 D0713 05:18:06.035206 644063 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:06.035227 644063 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.035235 644063 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc000760810 10 D0713 05:18:06.035242 644063 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:06.035374 644063 usertrap_amd64.go:212] [ 1081: 1084] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:06.035396 644063 usertrap_amd64.go:122] [ 1081: 1084] Allocate a new trap: 0xc000760810 11 D0713 05:18:06.035410 644063 usertrap_amd64.go:225] [ 1081: 1084] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:06.043881 644063 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.043933 644063 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc000760810 12 D0713 05:18:06.043946 644063 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:06.046610 644063 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.046651 644063 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc000760810 13 D0713 05:18:06.046667 644063 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:06.046712 644063 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.046733 644063 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc000760810 14 D0713 05:18:06.046743 644063 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:06.046794 644063 task_signals.go:470] [ 1081: 1081] Notified of signal 23 D0713 05:18:06.046865 644063 task_signals.go:220] [ 1081: 1081] Signal 23: delivering to handler D0713 05:18:06.054720 644063 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.054768 644063 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc000760810 15 D0713 05:18:06.054784 644063 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 05:18:06.054847 644063 task_exit.go:204] [ 1081: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.054876 644063 task_exit.go:204] [ 1081: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.054903 644063 task_signals.go:204] [ 1081: 1085] Signal 1081, PID: 1085, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.054921 644063 task_signals.go:204] [ 1081: 1083] Signal 1081, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.054932 644063 task_exit.go:204] [ 1081: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.054942 644063 task_signals.go:204] [ 1081: 1084] Signal 1081, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.054951 644063 task_signals.go:204] [ 1081: 1082] Signal 1081, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.054958 644063 task_exit.go:204] [ 1081: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.054962 644063 task_exit.go:204] [ 1081: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.054971 644063 task_exit.go:204] [ 1081: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.054976 644063 task_exit.go:204] [ 1081: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.054979 644063 task_exit.go:204] [ 1081: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.054990 644063 task_exit.go:204] [ 1081: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.055008 644063 task_exit.go:204] [ 1081: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.055013 644063 task_exit.go:204] [ 1081: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.055019 644063 task_exit.go:204] [ 1081: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.056166 644063 task_exit.go:204] [ 1081: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.056201 644063 task_exit.go:204] [ 1081: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.056216 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.056466 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.056505 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.056606 644063 task_exit.go:204] [ 1081: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.057240 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.059054 644063 syscalls.go:262] [ 1086: 1086] Allocating stack with size of 8388608 bytes D0713 05:18:06.059287 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.060117 644063 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.060160 644063 usertrap_amd64.go:106] [ 1086: 1086] Map a usertrap vma at 67000 D0713 05:18:06.060220 644063 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000c020f0 1 D0713 05:18:06.060245 644063 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:06.061446 644063 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.061476 644063 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000c020f0 2 D0713 05:18:06.061511 644063 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:06.062285 644063 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.062331 644063 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000c020f0 3 D0713 05:18:06.062343 644063 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:06.069199 644063 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.069268 644063 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000c020f0 4 D0713 05:18:06.069289 644063 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:06.070438 644063 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.070472 644063 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000c020f0 5 D0713 05:18:06.070488 644063 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:06.070532 644063 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.070539 644063 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000c020f0 6 D0713 05:18:06.070547 644063 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:06.070869 644063 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.070894 644063 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000c020f0 7 D0713 05:18:06.070904 644063 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:06.071236 644063 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.071267 644063 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc000c020f0 8 D0713 05:18:06.071281 644063 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:06.071446 644063 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.071491 644063 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000c020f0 9 D0713 05:18:06.071506 644063 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:06.071531 644063 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.071547 644063 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc000c020f0 10 D0713 05:18:06.071554 644063 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:06.079212 644063 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.079249 644063 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000c020f0 11 D0713 05:18:06.079264 644063 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:06.082828 644063 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.082857 644063 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc000c020f0 12 D0713 05:18:06.082873 644063 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:06.082919 644063 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.082938 644063 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc000c020f0 13 D0713 05:18:06.082951 644063 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:06.082989 644063 task_signals.go:470] [ 1086: 1086] Notified of signal 23 D0713 05:18:06.083082 644063 task_signals.go:220] [ 1086: 1086] Signal 23: delivering to handler D0713 05:18:06.089819 644063 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.089861 644063 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc000c020f0 14 D0713 05:18:06.089874 644063 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:06.089929 644063 task_exit.go:204] [ 1086: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.089984 644063 task_exit.go:204] [ 1086: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.090011 644063 task_signals.go:204] [ 1086: 1087] Signal 1086, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.090028 644063 task_exit.go:204] [ 1086: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.090037 644063 task_exit.go:204] [ 1086: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.090043 644063 task_exit.go:204] [ 1086: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.090060 644063 task_signals.go:204] [ 1086: 1088] Signal 1086, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.090083 644063 task_exit.go:204] [ 1086: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.090090 644063 task_exit.go:204] [ 1086: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.090096 644063 task_exit.go:204] [ 1086: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.090111 644063 task_signals.go:204] [ 1086: 1089] Signal 1086, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.090121 644063 task_exit.go:204] [ 1086: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.090128 644063 task_exit.go:204] [ 1086: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.090140 644063 task_exit.go:204] [ 1086: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.090162 644063 task_signals.go:204] [ 1086: 1090] Signal 1086, PID: 1090, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.090182 644063 task_exit.go:204] [ 1086: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.090190 644063 task_exit.go:204] [ 1086: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.090194 644063 task_exit.go:204] [ 1086: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.090205 644063 task_signals.go:204] [ 1086: 1091] Signal 1086, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.090221 644063 task_exit.go:204] [ 1086: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.091324 644063 task_exit.go:204] [ 1086: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.091352 644063 task_exit.go:204] [ 1086: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.091376 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.091953 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.091989 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.092115 644063 task_exit.go:204] [ 1086: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.092716 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.094188 644063 syscalls.go:262] [ 1092: 1092] Allocating stack with size of 8388608 bytes D0713 05:18:06.094295 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.095112 644063 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.095157 644063 usertrap_amd64.go:106] [ 1092: 1092] Map a usertrap vma at 66000 D0713 05:18:06.095232 644063 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000c022a0 1 D0713 05:18:06.095262 644063 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:06.095464 644063 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.095490 644063 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000c022a0 2 D0713 05:18:06.095499 644063 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:06.095997 644063 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.096016 644063 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000c022a0 3 D0713 05:18:06.096023 644063 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:06.101414 644063 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.101449 644063 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000c022a0 4 D0713 05:18:06.101461 644063 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:06.103258 644063 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.103292 644063 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000c022a0 5 D0713 05:18:06.103307 644063 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:06.103342 644063 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.103359 644063 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000c022a0 6 D0713 05:18:06.103367 644063 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:06.103573 644063 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.103601 644063 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000c022a0 7 D0713 05:18:06.103612 644063 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:06.103764 644063 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.103797 644063 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc000c022a0 8 D0713 05:18:06.103808 644063 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:06.103966 644063 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.103990 644063 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc000c022a0 9 D0713 05:18:06.103999 644063 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:06.104012 644063 usertrap_amd64.go:212] [ 1092: 1094] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:06.104016 644063 usertrap_amd64.go:122] [ 1092: 1094] Allocate a new trap: 0xc000c022a0 10 D0713 05:18:06.104022 644063 usertrap_amd64.go:225] [ 1092: 1094] Apply the binary patch addr 46b6e0 trap addr 66320 ([184 24 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:06.104028 644063 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.104032 644063 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000c022a0 11 D0713 05:18:06.104040 644063 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b57c trap addr 66370 ([184 202 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:06.113085 644063 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.113139 644063 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000c022a0 12 D0713 05:18:06.113154 644063 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:06.115558 644063 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.115613 644063 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc000c022a0 13 D0713 05:18:06.115630 644063 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:06.115684 644063 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.115701 644063 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc000c022a0 14 D0713 05:18:06.115714 644063 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:06.115876 644063 task_signals.go:470] [ 1092: 1092] Notified of signal 23 D0713 05:18:06.116035 644063 task_signals.go:220] [ 1092: 1092] Signal 23: delivering to handler D0713 05:18:06.123019 644063 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.123047 644063 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000c022a0 15 D0713 05:18:06.123061 644063 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 05:18:06.123110 644063 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.123141 644063 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.123170 644063 task_signals.go:204] [ 1092: 1093] Signal 1092, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.123195 644063 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.123204 644063 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.123210 644063 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.123229 644063 task_signals.go:204] [ 1092: 1094] Signal 1092, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.123240 644063 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.123247 644063 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.123261 644063 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.123283 644063 task_signals.go:204] [ 1092: 1095] Signal 1092, PID: 1095, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.123304 644063 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.123312 644063 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.123318 644063 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.123332 644063 task_signals.go:204] [ 1092: 1096] Signal 1092, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.123348 644063 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.124464 644063 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.124498 644063 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.124519 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.124588 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.124601 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.124817 644063 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.125206 644063 task_signals.go:470] [ 6: 13] Notified of signal 23 D0713 05:18:06.125279 644063 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 05:18:06.125745 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.127131 644063 syscalls.go:262] [ 1097: 1097] Allocating stack with size of 8388608 bytes D0713 05:18:06.127224 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.127903 644063 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.127944 644063 usertrap_amd64.go:106] [ 1097: 1097] Map a usertrap vma at 61000 D0713 05:18:06.128034 644063 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0012b7380 1 D0713 05:18:06.128085 644063 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:06.128379 644063 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.128454 644063 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0012b7380 2 D0713 05:18:06.128470 644063 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:06.128959 644063 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.128983 644063 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0012b7380 3 D0713 05:18:06.128992 644063 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:06.134586 644063 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.134629 644063 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0012b7380 4 D0713 05:18:06.134644 644063 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:06.135942 644063 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.135969 644063 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0012b7380 5 D0713 05:18:06.135983 644063 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:06.136057 644063 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.136074 644063 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0012b7380 6 D0713 05:18:06.136082 644063 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:06.136471 644063 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.136500 644063 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0012b7380 7 D0713 05:18:06.136511 644063 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:06.136669 644063 usertrap_amd64.go:212] [ 1097: 1098] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.136733 644063 usertrap_amd64.go:122] [ 1097: 1098] Allocate a new trap: 0xc0012b7380 8 D0713 05:18:06.136746 644063 usertrap_amd64.go:225] [ 1097: 1098] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:06.137022 644063 usertrap_amd64.go:212] [ 1097: 1098] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.137047 644063 usertrap_amd64.go:122] [ 1097: 1098] Allocate a new trap: 0xc0012b7380 9 D0713 05:18:06.137055 644063 usertrap_amd64.go:225] [ 1097: 1098] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:06.137136 644063 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.137161 644063 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0012b7380 10 D0713 05:18:06.137171 644063 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:06.137867 644063 usertrap_amd64.go:212] [ 1097: 1098] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.137986 644063 usertrap_amd64.go:122] [ 1097: 1098] Allocate a new trap: 0xc0012b7380 11 D0713 05:18:06.138076 644063 usertrap_amd64.go:225] [ 1097: 1098] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:06.138198 644063 usertrap_amd64.go:212] [ 1097: 1098] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.138270 644063 usertrap_amd64.go:122] [ 1097: 1098] Allocate a new trap: 0xc0012b7380 12 D0713 05:18:06.138321 644063 usertrap_amd64.go:225] [ 1097: 1098] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:06.138491 644063 task_signals.go:470] [ 1097: 1097] Notified of signal 23 D0713 05:18:06.138548 644063 task_signals.go:220] [ 1097: 1097] Signal 23: delivering to handler D0713 05:18:06.145508 644063 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.145532 644063 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0012b7380 13 D0713 05:18:06.145544 644063 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:06.149885 644063 task_signals.go:470] [ 1097: 1097] Notified of signal 23 D0713 05:18:06.149972 644063 task_signals.go:220] [ 1097: 1097] Signal 23: delivering to handler I0713 05:18:06.156688 644063 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0713 05:18:06.156767 644063 usertrap_amd64.go:212] [ 1097: 1098] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:06.156800 644063 usertrap_amd64.go:122] [ 1097: 1098] Allocate a new trap: 0xc0012b7380 14 D0713 05:18:06.156817 644063 usertrap_amd64.go:225] [ 1097: 1098] Apply the binary patch addr 46b6e0 trap addr 61460 ([184 24 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:06.156888 644063 usertrap_amd64.go:212] [ 1097: 1097] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.156898 644063 usertrap_amd64.go:122] [ 1097: 1097] Allocate a new trap: 0xc0012b7380 15 D0713 05:18:06.156906 644063 usertrap_amd64.go:225] [ 1097: 1097] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 05:18:06.156991 644063 task_exit.go:204] [ 1097: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.157018 644063 task_exit.go:204] [ 1097: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.157057 644063 task_signals.go:204] [ 1097: 1098] Signal 1097, PID: 1098, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.157072 644063 task_exit.go:204] [ 1097: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.157084 644063 task_exit.go:204] [ 1097: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.157090 644063 task_exit.go:204] [ 1097: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.157109 644063 task_signals.go:204] [ 1097: 1099] Signal 1097, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.157117 644063 task_exit.go:204] [ 1097: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.157124 644063 task_exit.go:204] [ 1097: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.157129 644063 task_exit.go:204] [ 1097: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.157141 644063 task_signals.go:204] [ 1097: 1100] Signal 1097, PID: 1100, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.157150 644063 task_exit.go:204] [ 1097: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.157157 644063 task_exit.go:204] [ 1097: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.157162 644063 task_exit.go:204] [ 1097: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.157179 644063 task_signals.go:204] [ 1097: 1101] Signal 1097, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.157188 644063 task_exit.go:204] [ 1097: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.165250 644063 task_exit.go:204] [ 1097: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.165295 644063 task_exit.go:204] [ 1097: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.165315 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.165353 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.165371 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.165607 644063 task_exit.go:204] [ 1097: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.166086 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.167434 644063 syscalls.go:262] [ 1102: 1102] Allocating stack with size of 8388608 bytes D0713 05:18:06.167548 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.168748 644063 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.168785 644063 usertrap_amd64.go:106] [ 1102: 1102] Map a usertrap vma at 69000 D0713 05:18:06.168854 644063 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000c02660 1 D0713 05:18:06.168894 644063 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:06.169259 644063 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.169302 644063 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000c02660 2 D0713 05:18:06.169315 644063 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:06.170017 644063 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.170044 644063 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000c02660 3 D0713 05:18:06.170052 644063 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:06.175988 644063 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.176020 644063 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000c02660 4 D0713 05:18:06.176033 644063 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:06.177263 644063 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.177296 644063 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000c02660 5 D0713 05:18:06.177310 644063 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:06.177396 644063 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.177426 644063 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000c02660 6 D0713 05:18:06.177438 644063 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:06.177786 644063 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.177810 644063 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000c02660 7 D0713 05:18:06.177817 644063 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:06.177991 644063 usertrap_amd64.go:212] [ 1102: 1103] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.178078 644063 usertrap_amd64.go:122] [ 1102: 1103] Allocate a new trap: 0xc000c02660 8 D0713 05:18:06.178103 644063 usertrap_amd64.go:225] [ 1102: 1103] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:06.178368 644063 usertrap_amd64.go:212] [ 1102: 1105] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.178408 644063 usertrap_amd64.go:122] [ 1102: 1105] Allocate a new trap: 0xc000c02660 9 D0713 05:18:06.178418 644063 usertrap_amd64.go:225] [ 1102: 1105] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:06.178445 644063 usertrap_amd64.go:212] [ 1102: 1103] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.178461 644063 usertrap_amd64.go:122] [ 1102: 1103] Allocate a new trap: 0xc000c02660 10 D0713 05:18:06.178471 644063 usertrap_amd64.go:225] [ 1102: 1103] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:06.185436 644063 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.185460 644063 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000c02660 11 D0713 05:18:06.185469 644063 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:06.188697 644063 usertrap_amd64.go:212] [ 1102: 1103] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.188726 644063 usertrap_amd64.go:122] [ 1102: 1103] Allocate a new trap: 0xc000c02660 12 D0713 05:18:06.188736 644063 usertrap_amd64.go:225] [ 1102: 1103] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:06.188755 644063 usertrap_amd64.go:212] [ 1102: 1103] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.188761 644063 usertrap_amd64.go:122] [ 1102: 1103] Allocate a new trap: 0xc000c02660 13 D0713 05:18:06.188769 644063 usertrap_amd64.go:225] [ 1102: 1103] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:06.188785 644063 task_signals.go:470] [ 1102: 1102] Notified of signal 23 D0713 05:18:06.188828 644063 task_signals.go:220] [ 1102: 1102] Signal 23: delivering to handler I0713 05:18:06.196925 644063 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0713 05:18:06.197035 644063 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.197046 644063 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc000c02660 14 D0713 05:18:06.197056 644063 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:06.197134 644063 task_exit.go:204] [ 1102: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.197170 644063 task_exit.go:204] [ 1102: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.197167 644063 task_signals.go:204] [ 1102: 1104] Signal 1102, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.197186 644063 task_exit.go:204] [ 1102: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.197195 644063 task_exit.go:204] [ 1102: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.197200 644063 task_exit.go:204] [ 1102: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.197220 644063 task_signals.go:204] [ 1102: 1105] Signal 1102, PID: 1105, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.197232 644063 task_signals.go:204] [ 1102: 1107] Signal 1102, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.197249 644063 task_signals.go:204] [ 1102: 1103] Signal 1102, PID: 1103, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.197265 644063 task_signals.go:204] [ 1102: 1106] Signal 1102, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.197284 644063 task_exit.go:204] [ 1102: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.197373 644063 task_exit.go:204] [ 1102: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.197384 644063 task_exit.go:204] [ 1102: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.197401 644063 task_exit.go:204] [ 1102: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.197409 644063 task_exit.go:204] [ 1102: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.197414 644063 task_exit.go:204] [ 1102: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.197422 644063 task_exit.go:204] [ 1102: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.197429 644063 task_exit.go:204] [ 1102: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.197444 644063 task_exit.go:204] [ 1102: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.197459 644063 task_exit.go:204] [ 1102: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.198566 644063 task_exit.go:204] [ 1102: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.198659 644063 task_exit.go:204] [ 1102: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.198760 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.198852 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.198865 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.198982 644063 task_exit.go:204] [ 1102: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.199604 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.201298 644063 syscalls.go:262] [ 1108: 1108] Allocating stack with size of 8388608 bytes D0713 05:18:06.201397 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.202207 644063 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.202250 644063 usertrap_amd64.go:106] [ 1108: 1108] Map a usertrap vma at 64000 D0713 05:18:06.202312 644063 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0012b7560 1 D0713 05:18:06.202343 644063 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:06.202501 644063 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.202514 644063 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0012b7560 2 D0713 05:18:06.202523 644063 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:06.204664 644063 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.204750 644063 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0012b7560 3 D0713 05:18:06.204811 644063 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:06.212048 644063 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.212093 644063 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0012b7560 4 D0713 05:18:06.212111 644063 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:06.214143 644063 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.214280 644063 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0012b7560 5 D0713 05:18:06.214306 644063 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:06.214412 644063 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.214433 644063 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0012b7560 6 D0713 05:18:06.214443 644063 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:06.214864 644063 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.214901 644063 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0012b7560 7 D0713 05:18:06.214915 644063 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:06.215110 644063 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.215139 644063 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc0012b7560 8 D0713 05:18:06.215151 644063 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:06.215396 644063 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.215422 644063 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc0012b7560 9 D0713 05:18:06.215440 644063 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:06.215451 644063 usertrap_amd64.go:212] [ 1108: 1110] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:06.215459 644063 usertrap_amd64.go:122] [ 1108: 1110] Allocate a new trap: 0xc0012b7560 10 D0713 05:18:06.215468 644063 usertrap_amd64.go:225] [ 1108: 1110] Apply the binary patch addr 46b6e0 trap addr 64320 ([184 24 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:06.215503 644063 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.215517 644063 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0012b7560 11 D0713 05:18:06.215545 644063 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b57c trap addr 64370 ([184 202 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:06.223399 644063 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.223440 644063 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0012b7560 12 D0713 05:18:06.223454 644063 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:06.226095 644063 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.226117 644063 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc0012b7560 13 D0713 05:18:06.226130 644063 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:06.226221 644063 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.226243 644063 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc0012b7560 14 D0713 05:18:06.226254 644063 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:06.226294 644063 task_signals.go:470] [ 1108: 1108] Notified of signal 23 D0713 05:18:06.226389 644063 task_signals.go:220] [ 1108: 1108] Signal 23: delivering to handler D0713 05:18:06.233840 644063 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.233890 644063 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0012b7560 15 D0713 05:18:06.233907 644063 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 05:18:06.233965 644063 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.234096 644063 task_signals.go:204] [ 1108: 1109] Signal 1108, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.234134 644063 task_signals.go:204] [ 1108: 1113] Signal 1108, PID: 1113, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.234144 644063 task_signals.go:204] [ 1108: 1110] Signal 1108, PID: 1110, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.234155 644063 task_signals.go:204] [ 1108: 1111] Signal 1108, PID: 1111, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.234165 644063 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.234180 644063 task_signals.go:204] [ 1108: 1112] Signal 1108, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.234199 644063 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.234235 644063 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.234249 644063 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.234261 644063 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.234318 644063 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.234336 644063 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.234354 644063 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.234373 644063 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.234381 644063 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.234405 644063 task_exit.go:204] [ 1108: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.234427 644063 task_exit.go:204] [ 1108: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.234433 644063 task_exit.go:204] [ 1108: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.234444 644063 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.235785 644063 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.235820 644063 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.235834 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.235911 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.235931 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.236109 644063 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.236887 644063 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.238325 644063 syscalls.go:262] [ 1114: 1114] Allocating stack with size of 8388608 bytes D0713 05:18:06.238440 644063 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.239584 644063 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.239629 644063 usertrap_amd64.go:106] [ 1114: 1114] Map a usertrap vma at 62000 D0713 05:18:06.239750 644063 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc00063dc80 1 D0713 05:18:06.239781 644063 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:06.239991 644063 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.240015 644063 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc00063dc80 2 D0713 05:18:06.240024 644063 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:06.240649 644063 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.240687 644063 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc00063dc80 3 D0713 05:18:06.240702 644063 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:06.247075 644063 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.247114 644063 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc00063dc80 4 D0713 05:18:06.247129 644063 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:06.248363 644063 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.248392 644063 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc00063dc80 5 D0713 05:18:06.248405 644063 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:06.248472 644063 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.248494 644063 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc00063dc80 6 D0713 05:18:06.248502 644063 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:06.249230 644063 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.249261 644063 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc00063dc80 7 D0713 05:18:06.249272 644063 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:06.249555 644063 usertrap_amd64.go:212] [ 1114: 1115] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.249576 644063 usertrap_amd64.go:122] [ 1114: 1115] Allocate a new trap: 0xc00063dc80 8 D0713 05:18:06.249586 644063 usertrap_amd64.go:225] [ 1114: 1115] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:06.249742 644063 usertrap_amd64.go:212] [ 1114: 1115] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.249791 644063 usertrap_amd64.go:122] [ 1114: 1115] Allocate a new trap: 0xc00063dc80 9 D0713 05:18:06.249805 644063 usertrap_amd64.go:225] [ 1114: 1115] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:06.249997 644063 usertrap_amd64.go:212] [ 1114: 1116] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.250024 644063 usertrap_amd64.go:122] [ 1114: 1116] Allocate a new trap: 0xc00063dc80 10 D0713 05:18:06.250035 644063 usertrap_amd64.go:225] [ 1114: 1116] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:06.257917 644063 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.257947 644063 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc00063dc80 11 D0713 05:18:06.257958 644063 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:06.261028 644063 usertrap_amd64.go:212] [ 1114: 1115] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.261058 644063 usertrap_amd64.go:122] [ 1114: 1115] Allocate a new trap: 0xc00063dc80 12 D0713 05:18:06.261079 644063 usertrap_amd64.go:225] [ 1114: 1115] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:06.261156 644063 usertrap_amd64.go:212] [ 1114: 1115] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.261163 644063 usertrap_amd64.go:122] [ 1114: 1115] Allocate a new trap: 0xc00063dc80 13 D0713 05:18:06.261169 644063 usertrap_amd64.go:225] [ 1114: 1115] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:06.261183 644063 task_signals.go:470] [ 1114: 1114] Notified of signal 23 D0713 05:18:06.261258 644063 task_signals.go:220] [ 1114: 1114] Signal 23: delivering to handler D0713 05:18:06.268707 644063 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.268834 644063 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc00063dc80 14 D0713 05:18:06.268862 644063 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:06.268895 644063 task_exit.go:204] [ 1114: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.268927 644063 task_signals.go:204] [ 1114: 1117] Signal 1114, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.268960 644063 task_exit.go:204] [ 1114: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.268994 644063 task_signals.go:204] [ 1114: 1118] Signal 1114, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.269019 644063 task_exit.go:204] [ 1114: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.269029 644063 task_exit.go:204] [ 1114: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.269035 644063 task_exit.go:204] [ 1114: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.269056 644063 task_signals.go:204] [ 1114: 1116] Signal 1114, PID: 1116, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.269076 644063 task_exit.go:204] [ 1114: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.269084 644063 task_exit.go:204] [ 1114: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.269092 644063 task_exit.go:204] [ 1114: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.269102 644063 task_exit.go:204] [ 1114: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.269110 644063 task_exit.go:204] [ 1114: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.269115 644063 task_exit.go:204] [ 1114: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.269125 644063 task_signals.go:204] [ 1114: 1115] Signal 1114, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.269136 644063 task_exit.go:204] [ 1114: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.270386 644063 task_exit.go:204] [ 1114: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.270462 644063 task_exit.go:204] [ 1114: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.270484 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.270521 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.270556 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.270759 644063 task_exit.go:204] [ 1114: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.271426 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.273102 644063 syscalls.go:262] [ 1119: 1119] Allocating stack with size of 8388608 bytes D0713 05:18:06.273206 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.273993 644063 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.274044 644063 usertrap_amd64.go:106] [ 1119: 1119] Map a usertrap vma at 65000 D0713 05:18:06.274125 644063 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc00063def0 1 D0713 05:18:06.274245 644063 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:06.275797 644063 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.275824 644063 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc00063def0 2 D0713 05:18:06.275848 644063 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:06.276691 644063 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.276723 644063 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc00063def0 3 D0713 05:18:06.276735 644063 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:06.284761 644063 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.284797 644063 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc00063def0 4 D0713 05:18:06.284809 644063 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:06.285999 644063 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.286029 644063 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc00063def0 5 D0713 05:18:06.286041 644063 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:06.286082 644063 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.286090 644063 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc00063def0 6 D0713 05:18:06.286097 644063 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:06.286295 644063 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.286452 644063 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc00063def0 7 D0713 05:18:06.286477 644063 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:06.286713 644063 usertrap_amd64.go:212] [ 1119: 1120] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.286735 644063 usertrap_amd64.go:122] [ 1119: 1120] Allocate a new trap: 0xc00063def0 8 D0713 05:18:06.286744 644063 usertrap_amd64.go:225] [ 1119: 1120] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:06.286934 644063 usertrap_amd64.go:212] [ 1119: 1120] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.286960 644063 usertrap_amd64.go:122] [ 1119: 1120] Allocate a new trap: 0xc00063def0 9 D0713 05:18:06.286970 644063 usertrap_amd64.go:225] [ 1119: 1120] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:06.287087 644063 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.287156 644063 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc00063def0 10 D0713 05:18:06.287223 644063 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:06.296375 644063 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.296391 644063 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc00063def0 11 D0713 05:18:06.296400 644063 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:06.298998 644063 usertrap_amd64.go:212] [ 1119: 1120] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.299038 644063 usertrap_amd64.go:122] [ 1119: 1120] Allocate a new trap: 0xc00063def0 12 D0713 05:18:06.299052 644063 usertrap_amd64.go:225] [ 1119: 1120] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:06.299100 644063 usertrap_amd64.go:212] [ 1119: 1120] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.299110 644063 usertrap_amd64.go:122] [ 1119: 1120] Allocate a new trap: 0xc00063def0 13 D0713 05:18:06.299120 644063 usertrap_amd64.go:225] [ 1119: 1120] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:06.299141 644063 task_signals.go:470] [ 1119: 1119] Notified of signal 23 D0713 05:18:06.299208 644063 task_signals.go:220] [ 1119: 1119] Signal 23: delivering to handler D0713 05:18:06.306437 644063 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.306490 644063 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc00063def0 14 D0713 05:18:06.306506 644063 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:06.306581 644063 task_exit.go:204] [ 1119: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.306613 644063 task_exit.go:204] [ 1119: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.306634 644063 task_signals.go:204] [ 1119: 1122] Signal 1119, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.306651 644063 task_exit.go:204] [ 1119: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.306659 644063 task_exit.go:204] [ 1119: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.306676 644063 task_exit.go:204] [ 1119: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.306630 644063 task_signals.go:204] [ 1119: 1121] Signal 1119, PID: 1121, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.306697 644063 task_signals.go:204] [ 1119: 1120] Signal 1119, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.306708 644063 task_exit.go:204] [ 1119: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.306718 644063 task_signals.go:204] [ 1119: 1123] Signal 1119, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.306737 644063 task_signals.go:204] [ 1119: 1124] Signal 1119, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.306745 644063 task_exit.go:204] [ 1119: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.306749 644063 task_exit.go:204] [ 1119: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.306756 644063 task_exit.go:204] [ 1119: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.306762 644063 task_exit.go:204] [ 1119: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.306766 644063 task_exit.go:204] [ 1119: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.306793 644063 task_exit.go:204] [ 1119: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.306799 644063 task_exit.go:204] [ 1119: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.306804 644063 task_exit.go:204] [ 1119: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.306810 644063 task_exit.go:204] [ 1119: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.307923 644063 task_exit.go:204] [ 1119: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.307937 644063 task_exit.go:204] [ 1119: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.307959 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.307996 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.308006 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.308108 644063 task_exit.go:204] [ 1119: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.308822 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.310250 644063 syscalls.go:262] [ 1125: 1125] Allocating stack with size of 8388608 bytes D0713 05:18:06.310373 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.311485 644063 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.311531 644063 usertrap_amd64.go:106] [ 1125: 1125] Map a usertrap vma at 65000 D0713 05:18:06.311611 644063 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc00044c210 1 D0713 05:18:06.311638 644063 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:06.312006 644063 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.312031 644063 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc00044c210 2 D0713 05:18:06.312042 644063 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:06.312681 644063 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.312717 644063 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc00044c210 3 D0713 05:18:06.312725 644063 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:06.318853 644063 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.318893 644063 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc00044c210 4 D0713 05:18:06.318909 644063 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:06.320228 644063 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.320258 644063 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc00044c210 5 D0713 05:18:06.320271 644063 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:06.320324 644063 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.320350 644063 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc00044c210 6 D0713 05:18:06.320357 644063 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:06.321496 644063 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.321528 644063 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc00044c210 7 D0713 05:18:06.321540 644063 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:06.321703 644063 usertrap_amd64.go:212] [ 1125: 1126] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.321724 644063 usertrap_amd64.go:122] [ 1125: 1126] Allocate a new trap: 0xc00044c210 8 D0713 05:18:06.321733 644063 usertrap_amd64.go:225] [ 1125: 1126] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:06.321937 644063 usertrap_amd64.go:212] [ 1125: 1126] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.321967 644063 usertrap_amd64.go:122] [ 1125: 1126] Allocate a new trap: 0xc00044c210 9 D0713 05:18:06.321980 644063 usertrap_amd64.go:225] [ 1125: 1126] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:06.322028 644063 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.322048 644063 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc00044c210 10 D0713 05:18:06.322058 644063 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:06.329980 644063 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.330020 644063 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc00044c210 11 D0713 05:18:06.330038 644063 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:06.332886 644063 usertrap_amd64.go:212] [ 1125: 1126] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.333015 644063 usertrap_amd64.go:122] [ 1125: 1126] Allocate a new trap: 0xc00044c210 12 D0713 05:18:06.333152 644063 usertrap_amd64.go:225] [ 1125: 1126] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:06.333237 644063 usertrap_amd64.go:212] [ 1125: 1126] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.333281 644063 usertrap_amd64.go:122] [ 1125: 1126] Allocate a new trap: 0xc00044c210 13 D0713 05:18:06.333304 644063 usertrap_amd64.go:225] [ 1125: 1126] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:06.333364 644063 task_signals.go:470] [ 1125: 1125] Notified of signal 23 D0713 05:18:06.333476 644063 task_signals.go:220] [ 1125: 1125] Signal 23: delivering to handler D0713 05:18:06.340726 644063 usertrap_amd64.go:212] [ 1125: 1125] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.340762 644063 usertrap_amd64.go:122] [ 1125: 1125] Allocate a new trap: 0xc00044c210 14 D0713 05:18:06.340774 644063 usertrap_amd64.go:225] [ 1125: 1125] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:06.340829 644063 task_exit.go:204] [ 1125: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.340856 644063 task_exit.go:204] [ 1125: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.340901 644063 task_signals.go:204] [ 1125: 1128] Signal 1125, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.340921 644063 task_signals.go:204] [ 1125: 1129] Signal 1125, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.340933 644063 task_exit.go:204] [ 1125: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.340907 644063 task_signals.go:204] [ 1125: 1126] Signal 1125, PID: 1126, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.340990 644063 task_signals.go:204] [ 1125: 1127] Signal 1125, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.341010 644063 task_exit.go:204] [ 1125: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.341051 644063 task_exit.go:204] [ 1125: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.341059 644063 task_exit.go:204] [ 1125: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.341077 644063 task_exit.go:204] [ 1125: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.341083 644063 task_exit.go:204] [ 1125: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.341094 644063 task_exit.go:204] [ 1125: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.341110 644063 task_exit.go:204] [ 1125: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.341117 644063 task_exit.go:204] [ 1125: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.341136 644063 task_exit.go:204] [ 1125: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.342375 644063 task_exit.go:204] [ 1125: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.342415 644063 task_exit.go:204] [ 1125: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.342434 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.342708 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.342734 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.342834 644063 task_exit.go:204] [ 1125: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.343468 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.344932 644063 syscalls.go:262] [ 1130: 1130] Allocating stack with size of 8388608 bytes D0713 05:18:06.345100 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.345589 644063 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 05:18:06.345800 644063 task_signals.go:179] [ 6: 17] Restarting syscall 202: interrupted by signal 23 D0713 05:18:06.345825 644063 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 05:18:06.346508 644063 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.346537 644063 usertrap_amd64.go:106] [ 1130: 1130] Map a usertrap vma at 68000 D0713 05:18:06.346599 644063 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc0014c23c0 1 D0713 05:18:06.346634 644063 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:06.346851 644063 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.346873 644063 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc0014c23c0 2 D0713 05:18:06.346882 644063 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:06.347509 644063 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.347531 644063 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc0014c23c0 3 D0713 05:18:06.347538 644063 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:06.353546 644063 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.353577 644063 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc0014c23c0 4 D0713 05:18:06.353587 644063 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:06.354815 644063 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.354852 644063 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc0014c23c0 5 D0713 05:18:06.354874 644063 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:06.355116 644063 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.355147 644063 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc0014c23c0 6 D0713 05:18:06.355159 644063 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:06.355481 644063 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.355504 644063 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc0014c23c0 7 D0713 05:18:06.355512 644063 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:06.355629 644063 usertrap_amd64.go:212] [ 1130: 1131] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.355646 644063 usertrap_amd64.go:122] [ 1130: 1131] Allocate a new trap: 0xc0014c23c0 8 D0713 05:18:06.355652 644063 usertrap_amd64.go:225] [ 1130: 1131] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:06.355782 644063 usertrap_amd64.go:212] [ 1130: 1131] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.355804 644063 usertrap_amd64.go:122] [ 1130: 1131] Allocate a new trap: 0xc0014c23c0 9 D0713 05:18:06.355813 644063 usertrap_amd64.go:225] [ 1130: 1131] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:06.355988 644063 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.356022 644063 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc0014c23c0 10 D0713 05:18:06.356035 644063 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:06.365421 644063 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.365456 644063 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc0014c23c0 11 D0713 05:18:06.365468 644063 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:06.368163 644063 usertrap_amd64.go:212] [ 1130: 1131] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.368195 644063 usertrap_amd64.go:122] [ 1130: 1131] Allocate a new trap: 0xc0014c23c0 12 D0713 05:18:06.368209 644063 usertrap_amd64.go:225] [ 1130: 1131] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:06.368315 644063 usertrap_amd64.go:212] [ 1130: 1131] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.368385 644063 usertrap_amd64.go:122] [ 1130: 1131] Allocate a new trap: 0xc0014c23c0 13 D0713 05:18:06.368415 644063 usertrap_amd64.go:225] [ 1130: 1131] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:06.368467 644063 task_signals.go:470] [ 1130: 1130] Notified of signal 23 D0713 05:18:06.368546 644063 task_signals.go:220] [ 1130: 1130] Signal 23: delivering to handler D0713 05:18:06.377286 644063 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.377327 644063 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc0014c23c0 14 D0713 05:18:06.377342 644063 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:06.377378 644063 task_exit.go:204] [ 1130: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.377418 644063 task_exit.go:204] [ 1130: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.377444 644063 task_signals.go:204] [ 1130: 1131] Signal 1130, PID: 1131, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.377461 644063 task_exit.go:204] [ 1130: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.377469 644063 task_exit.go:204] [ 1130: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.377474 644063 task_exit.go:204] [ 1130: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.377492 644063 task_signals.go:204] [ 1130: 1132] Signal 1130, PID: 1132, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.377512 644063 task_exit.go:204] [ 1130: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.377519 644063 task_exit.go:204] [ 1130: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.377524 644063 task_exit.go:204] [ 1130: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.377537 644063 task_signals.go:204] [ 1130: 1133] Signal 1130, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.377556 644063 task_exit.go:204] [ 1130: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.377563 644063 task_exit.go:204] [ 1130: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.377569 644063 task_exit.go:204] [ 1130: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.377582 644063 task_signals.go:204] [ 1130: 1134] Signal 1130, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.377601 644063 task_exit.go:204] [ 1130: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.378802 644063 task_exit.go:204] [ 1130: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.378831 644063 task_exit.go:204] [ 1130: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.378846 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.383361 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.383397 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.383611 644063 task_exit.go:204] [ 1130: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.384307 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.385675 644063 syscalls.go:262] [ 1135: 1135] Allocating stack with size of 8388608 bytes D0713 05:18:06.385767 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.389147 644063 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.389189 644063 usertrap_amd64.go:106] [ 1135: 1135] Map a usertrap vma at 64000 D0713 05:18:06.389276 644063 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00184dda0 1 D0713 05:18:06.389293 644063 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:06.389621 644063 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.389635 644063 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00184dda0 2 D0713 05:18:06.389644 644063 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:06.390182 644063 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.390204 644063 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00184dda0 3 D0713 05:18:06.390211 644063 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:06.396150 644063 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.396184 644063 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00184dda0 4 D0713 05:18:06.396197 644063 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:06.397463 644063 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.397491 644063 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00184dda0 5 D0713 05:18:06.397499 644063 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:06.397556 644063 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.397565 644063 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00184dda0 6 D0713 05:18:06.397573 644063 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:06.397778 644063 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.397801 644063 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00184dda0 7 D0713 05:18:06.397816 644063 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:06.398027 644063 usertrap_amd64.go:212] [ 1135: 1136] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.398053 644063 usertrap_amd64.go:122] [ 1135: 1136] Allocate a new trap: 0xc00184dda0 8 D0713 05:18:06.398063 644063 usertrap_amd64.go:225] [ 1135: 1136] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:06.398435 644063 usertrap_amd64.go:212] [ 1135: 1136] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.398459 644063 usertrap_amd64.go:122] [ 1135: 1136] Allocate a new trap: 0xc00184dda0 9 D0713 05:18:06.398469 644063 usertrap_amd64.go:225] [ 1135: 1136] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:06.398495 644063 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.398507 644063 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00184dda0 10 D0713 05:18:06.398515 644063 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:06.398682 644063 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:06.398708 644063 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00184dda0 11 D0713 05:18:06.398716 644063 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:06.406158 644063 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.406196 644063 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00184dda0 12 D0713 05:18:06.406207 644063 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:06.408795 644063 usertrap_amd64.go:212] [ 1135: 1136] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.409216 644063 usertrap_amd64.go:122] [ 1135: 1136] Allocate a new trap: 0xc00184dda0 13 D0713 05:18:06.409252 644063 usertrap_amd64.go:225] [ 1135: 1136] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:06.409310 644063 usertrap_amd64.go:212] [ 1135: 1136] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.409372 644063 usertrap_amd64.go:122] [ 1135: 1136] Allocate a new trap: 0xc00184dda0 14 D0713 05:18:06.409386 644063 usertrap_amd64.go:225] [ 1135: 1136] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:06.409431 644063 task_signals.go:470] [ 1135: 1135] Notified of signal 23 D0713 05:18:06.409513 644063 task_signals.go:220] [ 1135: 1135] Signal 23: delivering to handler D0713 05:18:06.420433 644063 task_signals.go:470] [ 1135: 1135] Notified of signal 23 D0713 05:18:06.420499 644063 task_signals.go:220] [ 1135: 1135] Signal 23: delivering to handler D0713 05:18:06.423564 644063 usertrap_amd64.go:212] [ 1135: 1135] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.423595 644063 usertrap_amd64.go:122] [ 1135: 1135] Allocate a new trap: 0xc00184dda0 15 D0713 05:18:06.423608 644063 usertrap_amd64.go:225] [ 1135: 1135] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 05:18:06.423690 644063 task_exit.go:204] [ 1135: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.423720 644063 task_exit.go:204] [ 1135: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.423750 644063 task_signals.go:204] [ 1135: 1138] Signal 1135, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.423744 644063 task_signals.go:204] [ 1135: 1137] Signal 1135, PID: 1137, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.423774 644063 task_exit.go:204] [ 1135: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.423785 644063 task_exit.go:204] [ 1135: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.423792 644063 task_exit.go:204] [ 1135: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.423770 644063 task_signals.go:204] [ 1135: 1136] Signal 1135, PID: 1136, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.423820 644063 task_exit.go:204] [ 1135: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.423826 644063 task_signals.go:204] [ 1135: 1139] Signal 1135, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.423836 644063 task_exit.go:204] [ 1135: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.423840 644063 task_exit.go:204] [ 1135: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.423851 644063 task_exit.go:204] [ 1135: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.423869 644063 task_exit.go:204] [ 1135: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.423886 644063 task_exit.go:204] [ 1135: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.423897 644063 task_exit.go:204] [ 1135: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.425408 644063 task_exit.go:204] [ 1135: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.425440 644063 task_exit.go:204] [ 1135: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.425460 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.425489 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.425499 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.425709 644063 task_exit.go:204] [ 1135: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.426408 644063 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.428016 644063 syscalls.go:262] [ 1140: 1140] Allocating stack with size of 8388608 bytes D0713 05:18:06.428281 644063 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.429754 644063 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.429827 644063 usertrap_amd64.go:106] [ 1140: 1140] Map a usertrap vma at 61000 D0713 05:18:06.430161 644063 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0012b7a40 1 D0713 05:18:06.430212 644063 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:06.430597 644063 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.430625 644063 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0012b7a40 2 D0713 05:18:06.430640 644063 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:06.431743 644063 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.431771 644063 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0012b7a40 3 D0713 05:18:06.431784 644063 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:06.441553 644063 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.441592 644063 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0012b7a40 4 D0713 05:18:06.441608 644063 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:06.447340 644063 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.447372 644063 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0012b7a40 5 D0713 05:18:06.447401 644063 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:06.447472 644063 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.447486 644063 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0012b7a40 6 D0713 05:18:06.447495 644063 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:06.447868 644063 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.447895 644063 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0012b7a40 7 D0713 05:18:06.447916 644063 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:06.448129 644063 usertrap_amd64.go:212] [ 1140: 1141] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.448279 644063 usertrap_amd64.go:122] [ 1140: 1141] Allocate a new trap: 0xc0012b7a40 8 D0713 05:18:06.448315 644063 usertrap_amd64.go:225] [ 1140: 1141] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:06.448583 644063 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.448611 644063 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0012b7a40 9 D0713 05:18:06.448621 644063 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:06.448709 644063 usertrap_amd64.go:212] [ 1140: 1141] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.448721 644063 usertrap_amd64.go:122] [ 1140: 1141] Allocate a new trap: 0xc0012b7a40 10 D0713 05:18:06.448732 644063 usertrap_amd64.go:225] [ 1140: 1141] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:06.459167 644063 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.459215 644063 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0012b7a40 11 D0713 05:18:06.459232 644063 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:06.459819 644063 usertrap_amd64.go:212] [ 1140: 1141] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.459851 644063 usertrap_amd64.go:122] [ 1140: 1141] Allocate a new trap: 0xc0012b7a40 12 D0713 05:18:06.459865 644063 usertrap_amd64.go:225] [ 1140: 1141] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:06.459984 644063 usertrap_amd64.go:212] [ 1140: 1141] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.460000 644063 usertrap_amd64.go:122] [ 1140: 1141] Allocate a new trap: 0xc0012b7a40 13 D0713 05:18:06.460008 644063 usertrap_amd64.go:225] [ 1140: 1141] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:06.460030 644063 task_signals.go:470] [ 1140: 1140] Notified of signal 23 D0713 05:18:06.460173 644063 task_signals.go:220] [ 1140: 1140] Signal 23: delivering to handler D0713 05:18:06.471379 644063 task_signals.go:470] [ 1140: 1140] Notified of signal 23 D0713 05:18:06.472821 644063 task_signals.go:220] [ 1140: 1140] Signal 23: delivering to handler D0713 05:18:06.472974 644063 task_signals.go:481] [ 1140: 1140] No task notified of signal 23 D0713 05:18:06.473021 644063 task_signals.go:220] [ 1140: 1140] Signal 23: delivering to handler D0713 05:18:06.473141 644063 task_signals.go:470] [ 1140: 1140] Notified of signal 23 D0713 05:18:06.473173 644063 task_signals.go:220] [ 1140: 1140] Signal 23: delivering to handler D0713 05:18:06.473471 644063 usertrap_amd64.go:212] [ 1140: 1140] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.473503 644063 usertrap_amd64.go:122] [ 1140: 1140] Allocate a new trap: 0xc0012b7a40 14 D0713 05:18:06.473520 644063 usertrap_amd64.go:225] [ 1140: 1140] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:06.473629 644063 task_exit.go:204] [ 1140: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.473666 644063 task_exit.go:204] [ 1140: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.473696 644063 task_signals.go:204] [ 1140: 1141] Signal 1140, PID: 1141, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.473711 644063 task_exit.go:204] [ 1140: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.473720 644063 task_exit.go:204] [ 1140: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.473725 644063 task_exit.go:204] [ 1140: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.473744 644063 task_signals.go:204] [ 1140: 1142] Signal 1140, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.473766 644063 task_exit.go:204] [ 1140: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.473782 644063 task_exit.go:204] [ 1140: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.473788 644063 task_exit.go:204] [ 1140: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.473803 644063 task_signals.go:204] [ 1140: 1143] Signal 1140, PID: 1143, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.473813 644063 task_exit.go:204] [ 1140: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.473820 644063 task_exit.go:204] [ 1140: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.473826 644063 task_exit.go:204] [ 1140: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.473837 644063 task_signals.go:204] [ 1140: 1144] Signal 1140, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.473856 644063 task_exit.go:204] [ 1140: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.475061 644063 task_exit.go:204] [ 1140: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.475142 644063 task_exit.go:204] [ 1140: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.475168 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.475207 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.475244 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.475520 644063 task_exit.go:204] [ 1140: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.476328 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.477723 644063 syscalls.go:262] [ 1145: 1145] Allocating stack with size of 8388608 bytes D0713 05:18:06.477825 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.479740 644063 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.479783 644063 usertrap_amd64.go:106] [ 1145: 1145] Map a usertrap vma at 63000 D0713 05:18:06.479862 644063 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc00044c3f0 1 D0713 05:18:06.479890 644063 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:06.480298 644063 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.480319 644063 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc00044c3f0 2 D0713 05:18:06.480328 644063 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:06.480936 644063 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.480989 644063 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc00044c3f0 3 D0713 05:18:06.480996 644063 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:06.489383 644063 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.489424 644063 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc00044c3f0 4 D0713 05:18:06.489442 644063 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:06.490944 644063 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.490987 644063 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc00044c3f0 5 D0713 05:18:06.491002 644063 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:06.491140 644063 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.491224 644063 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc00044c3f0 6 D0713 05:18:06.491293 644063 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:06.491728 644063 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.491753 644063 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc00044c3f0 7 D0713 05:18:06.491764 644063 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:06.492338 644063 usertrap_amd64.go:212] [ 1145: 1146] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.492437 644063 usertrap_amd64.go:122] [ 1145: 1146] Allocate a new trap: 0xc00044c3f0 8 D0713 05:18:06.492491 644063 usertrap_amd64.go:225] [ 1145: 1146] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:06.492741 644063 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.492760 644063 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc00044c3f0 9 D0713 05:18:06.492772 644063 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:06.493109 644063 usertrap_amd64.go:212] [ 1145: 1146] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.493147 644063 usertrap_amd64.go:122] [ 1145: 1146] Allocate a new trap: 0xc00044c3f0 10 D0713 05:18:06.493161 644063 usertrap_amd64.go:225] [ 1145: 1146] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:06.502929 644063 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.502973 644063 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc00044c3f0 11 D0713 05:18:06.502989 644063 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:06.505488 644063 usertrap_amd64.go:212] [ 1145: 1146] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.505522 644063 usertrap_amd64.go:122] [ 1145: 1146] Allocate a new trap: 0xc00044c3f0 12 D0713 05:18:06.505538 644063 usertrap_amd64.go:225] [ 1145: 1146] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:06.505588 644063 usertrap_amd64.go:212] [ 1145: 1146] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.505605 644063 usertrap_amd64.go:122] [ 1145: 1146] Allocate a new trap: 0xc00044c3f0 13 D0713 05:18:06.505613 644063 usertrap_amd64.go:225] [ 1145: 1146] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:06.505634 644063 task_signals.go:470] [ 1145: 1145] Notified of signal 23 D0713 05:18:06.505726 644063 task_signals.go:220] [ 1145: 1145] Signal 23: delivering to handler D0713 05:18:06.514213 644063 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.514274 644063 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc00044c3f0 14 D0713 05:18:06.514294 644063 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:06.514344 644063 task_exit.go:204] [ 1145: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.514395 644063 task_exit.go:204] [ 1145: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.514430 644063 task_signals.go:204] [ 1145: 1147] Signal 1145, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.514457 644063 task_exit.go:204] [ 1145: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.514460 644063 task_signals.go:204] [ 1145: 1146] Signal 1145, PID: 1146, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.514465 644063 task_exit.go:204] [ 1145: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.514474 644063 task_exit.go:204] [ 1145: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.514491 644063 task_signals.go:204] [ 1145: 1148] Signal 1145, PID: 1148, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.514503 644063 task_exit.go:204] [ 1145: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.514510 644063 task_signals.go:204] [ 1145: 1149] Signal 1145, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.514557 644063 task_exit.go:204] [ 1145: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.514587 644063 task_exit.go:204] [ 1145: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.514631 644063 task_exit.go:204] [ 1145: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.514674 644063 task_exit.go:204] [ 1145: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.514685 644063 task_exit.go:204] [ 1145: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.514698 644063 task_exit.go:204] [ 1145: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.516056 644063 task_exit.go:204] [ 1145: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.516089 644063 task_exit.go:204] [ 1145: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.516110 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.516178 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.516193 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.516438 644063 task_exit.go:204] [ 1145: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.517048 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.518942 644063 syscalls.go:262] [ 1150: 1150] Allocating stack with size of 8388608 bytes D0713 05:18:06.519138 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.520189 644063 usertrap_amd64.go:212] [ 1150: 1150] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.520291 644063 usertrap_amd64.go:106] [ 1150: 1150] Map a usertrap vma at 64000 D0713 05:18:06.520437 644063 usertrap_amd64.go:122] [ 1150: 1150] Allocate a new trap: 0xc00044c6f0 1 D0713 05:18:06.520478 644063 usertrap_amd64.go:225] [ 1150: 1150] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:06.521039 644063 usertrap_amd64.go:212] [ 1150: 1150] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.521060 644063 usertrap_amd64.go:122] [ 1150: 1150] Allocate a new trap: 0xc00044c6f0 2 D0713 05:18:06.521074 644063 usertrap_amd64.go:225] [ 1150: 1150] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:06.521788 644063 usertrap_amd64.go:212] [ 1150: 1150] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.521817 644063 usertrap_amd64.go:122] [ 1150: 1150] Allocate a new trap: 0xc00044c6f0 3 D0713 05:18:06.521830 644063 usertrap_amd64.go:225] [ 1150: 1150] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:06.531712 644063 usertrap_amd64.go:212] [ 1150: 1150] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.531763 644063 usertrap_amd64.go:122] [ 1150: 1150] Allocate a new trap: 0xc00044c6f0 4 D0713 05:18:06.531778 644063 usertrap_amd64.go:225] [ 1150: 1150] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:06.533189 644063 usertrap_amd64.go:212] [ 1150: 1150] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.533229 644063 usertrap_amd64.go:122] [ 1150: 1150] Allocate a new trap: 0xc00044c6f0 5 D0713 05:18:06.533241 644063 usertrap_amd64.go:225] [ 1150: 1150] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:06.533325 644063 usertrap_amd64.go:212] [ 1150: 1150] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.533335 644063 usertrap_amd64.go:122] [ 1150: 1150] Allocate a new trap: 0xc00044c6f0 6 D0713 05:18:06.533352 644063 usertrap_amd64.go:225] [ 1150: 1150] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:06.537310 644063 usertrap_amd64.go:212] [ 1150: 1150] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.537354 644063 usertrap_amd64.go:122] [ 1150: 1150] Allocate a new trap: 0xc00044c6f0 7 D0713 05:18:06.537368 644063 usertrap_amd64.go:225] [ 1150: 1150] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:06.540463 644063 usertrap_amd64.go:212] [ 1150: 1151] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.540504 644063 usertrap_amd64.go:122] [ 1150: 1151] Allocate a new trap: 0xc00044c6f0 8 D0713 05:18:06.540517 644063 usertrap_amd64.go:225] [ 1150: 1151] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:06.540816 644063 usertrap_amd64.go:212] [ 1150: 1150] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.540845 644063 usertrap_amd64.go:122] [ 1150: 1150] Allocate a new trap: 0xc00044c6f0 9 D0713 05:18:06.540854 644063 usertrap_amd64.go:225] [ 1150: 1150] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:06.540893 644063 usertrap_amd64.go:212] [ 1150: 1151] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.540904 644063 usertrap_amd64.go:122] [ 1150: 1151] Allocate a new trap: 0xc00044c6f0 10 D0713 05:18:06.540912 644063 usertrap_amd64.go:225] [ 1150: 1151] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:06.550607 644063 usertrap_amd64.go:212] [ 1150: 1150] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.550651 644063 usertrap_amd64.go:122] [ 1150: 1150] Allocate a new trap: 0xc00044c6f0 11 D0713 05:18:06.550666 644063 usertrap_amd64.go:225] [ 1150: 1150] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:06.556264 644063 usertrap_amd64.go:212] [ 1150: 1151] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.556300 644063 usertrap_amd64.go:122] [ 1150: 1151] Allocate a new trap: 0xc00044c6f0 12 D0713 05:18:06.556317 644063 usertrap_amd64.go:225] [ 1150: 1151] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:06.556342 644063 usertrap_amd64.go:212] [ 1150: 1151] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.556349 644063 usertrap_amd64.go:122] [ 1150: 1151] Allocate a new trap: 0xc00044c6f0 13 D0713 05:18:06.556357 644063 usertrap_amd64.go:225] [ 1150: 1151] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:06.556711 644063 task_signals.go:470] [ 1150: 1150] Notified of signal 23 D0713 05:18:06.556971 644063 task_signals.go:220] [ 1150: 1150] Signal 23: delivering to handler I0713 05:18:06.562818 644063 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0713 05:18:06.562900 644063 usertrap_amd64.go:212] [ 1150: 1150] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.562919 644063 usertrap_amd64.go:122] [ 1150: 1150] Allocate a new trap: 0xc00044c6f0 14 D0713 05:18:06.562935 644063 usertrap_amd64.go:225] [ 1150: 1150] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:06.562984 644063 task_exit.go:204] [ 1150: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.563019 644063 task_exit.go:204] [ 1150: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.563043 644063 task_signals.go:204] [ 1150: 1151] Signal 1150, PID: 1151, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.563065 644063 task_exit.go:204] [ 1150: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.563085 644063 task_exit.go:204] [ 1150: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.563104 644063 task_exit.go:204] [ 1150: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.563126 644063 task_signals.go:204] [ 1150: 1152] Signal 1150, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.563135 644063 task_exit.go:204] [ 1150: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.563142 644063 task_exit.go:204] [ 1150: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.563148 644063 task_exit.go:204] [ 1150: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.563160 644063 task_signals.go:204] [ 1150: 1153] Signal 1150, PID: 1153, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.563178 644063 task_exit.go:204] [ 1150: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.563184 644063 task_exit.go:204] [ 1150: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.563188 644063 task_exit.go:204] [ 1150: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.563203 644063 task_signals.go:204] [ 1150: 1154] Signal 1150, PID: 1154, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.563218 644063 task_exit.go:204] [ 1150: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.565762 644063 task_exit.go:204] [ 1150: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.565807 644063 task_exit.go:204] [ 1150: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.565827 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.565854 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.565863 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.566102 644063 task_exit.go:204] [ 1150: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.566753 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.568300 644063 syscalls.go:262] [ 1155: 1155] Allocating stack with size of 8388608 bytes D0713 05:18:06.568418 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.569351 644063 usertrap_amd64.go:212] [ 1155: 1155] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.569424 644063 usertrap_amd64.go:106] [ 1155: 1155] Map a usertrap vma at 63000 D0713 05:18:06.569496 644063 usertrap_amd64.go:122] [ 1155: 1155] Allocate a new trap: 0xc000761650 1 D0713 05:18:06.569539 644063 usertrap_amd64.go:225] [ 1155: 1155] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:06.570055 644063 usertrap_amd64.go:212] [ 1155: 1155] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.570071 644063 usertrap_amd64.go:122] [ 1155: 1155] Allocate a new trap: 0xc000761650 2 D0713 05:18:06.570082 644063 usertrap_amd64.go:225] [ 1155: 1155] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:06.570612 644063 usertrap_amd64.go:212] [ 1155: 1155] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.570674 644063 usertrap_amd64.go:122] [ 1155: 1155] Allocate a new trap: 0xc000761650 3 D0713 05:18:06.570690 644063 usertrap_amd64.go:225] [ 1155: 1155] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:06.576268 644063 usertrap_amd64.go:212] [ 1155: 1155] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.576305 644063 usertrap_amd64.go:122] [ 1155: 1155] Allocate a new trap: 0xc000761650 4 D0713 05:18:06.576321 644063 usertrap_amd64.go:225] [ 1155: 1155] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:06.577588 644063 usertrap_amd64.go:212] [ 1155: 1155] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.577616 644063 usertrap_amd64.go:122] [ 1155: 1155] Allocate a new trap: 0xc000761650 5 D0713 05:18:06.577627 644063 usertrap_amd64.go:225] [ 1155: 1155] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:06.577678 644063 usertrap_amd64.go:212] [ 1155: 1155] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.577692 644063 usertrap_amd64.go:122] [ 1155: 1155] Allocate a new trap: 0xc000761650 6 D0713 05:18:06.577699 644063 usertrap_amd64.go:225] [ 1155: 1155] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:06.577901 644063 usertrap_amd64.go:212] [ 1155: 1155] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.577926 644063 usertrap_amd64.go:122] [ 1155: 1155] Allocate a new trap: 0xc000761650 7 D0713 05:18:06.577935 644063 usertrap_amd64.go:225] [ 1155: 1155] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:06.578130 644063 usertrap_amd64.go:212] [ 1155: 1156] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.578152 644063 usertrap_amd64.go:122] [ 1155: 1156] Allocate a new trap: 0xc000761650 8 D0713 05:18:06.578161 644063 usertrap_amd64.go:225] [ 1155: 1156] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:06.578447 644063 usertrap_amd64.go:212] [ 1155: 1156] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.578467 644063 usertrap_amd64.go:122] [ 1155: 1156] Allocate a new trap: 0xc000761650 9 D0713 05:18:06.578536 644063 usertrap_amd64.go:225] [ 1155: 1156] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:06.578559 644063 usertrap_amd64.go:212] [ 1155: 1155] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.578568 644063 usertrap_amd64.go:122] [ 1155: 1155] Allocate a new trap: 0xc000761650 10 D0713 05:18:06.578587 644063 usertrap_amd64.go:225] [ 1155: 1155] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:06.589554 644063 usertrap_amd64.go:212] [ 1155: 1155] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.589606 644063 usertrap_amd64.go:122] [ 1155: 1155] Allocate a new trap: 0xc000761650 11 D0713 05:18:06.589622 644063 usertrap_amd64.go:225] [ 1155: 1155] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:06.590418 644063 usertrap_amd64.go:212] [ 1155: 1156] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.590450 644063 usertrap_amd64.go:122] [ 1155: 1156] Allocate a new trap: 0xc000761650 12 D0713 05:18:06.590464 644063 usertrap_amd64.go:225] [ 1155: 1156] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:06.590546 644063 usertrap_amd64.go:212] [ 1155: 1156] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.590574 644063 usertrap_amd64.go:122] [ 1155: 1156] Allocate a new trap: 0xc000761650 13 D0713 05:18:06.590583 644063 usertrap_amd64.go:225] [ 1155: 1156] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:06.590599 644063 task_signals.go:470] [ 1155: 1155] Notified of signal 23 D0713 05:18:06.590752 644063 task_signals.go:220] [ 1155: 1155] Signal 23: delivering to handler D0713 05:18:06.601463 644063 task_signals.go:470] [ 1155: 1155] Notified of signal 23 D0713 05:18:06.601573 644063 task_signals.go:220] [ 1155: 1155] Signal 23: delivering to handler D0713 05:18:06.601983 644063 usertrap_amd64.go:212] [ 1155: 1155] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.602036 644063 usertrap_amd64.go:122] [ 1155: 1155] Allocate a new trap: 0xc000761650 14 D0713 05:18:06.602054 644063 usertrap_amd64.go:225] [ 1155: 1155] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:06.602139 644063 task_exit.go:204] [ 1155: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.602176 644063 task_exit.go:204] [ 1155: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.602212 644063 task_signals.go:204] [ 1155: 1158] Signal 1155, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.602233 644063 task_signals.go:204] [ 1155: 1159] Signal 1155, PID: 1159, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.602238 644063 task_signals.go:204] [ 1155: 1156] Signal 1155, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.602206 644063 task_signals.go:204] [ 1155: 1157] Signal 1155, PID: 1157, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.602242 644063 task_exit.go:204] [ 1155: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.602293 644063 task_exit.go:204] [ 1155: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.602320 644063 task_exit.go:204] [ 1155: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.602343 644063 task_exit.go:204] [ 1155: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.602352 644063 task_exit.go:204] [ 1155: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.602365 644063 task_exit.go:204] [ 1155: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.602381 644063 task_signals.go:204] [ 1155: 1160] Signal 1155, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.602416 644063 task_exit.go:204] [ 1155: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.602424 644063 task_exit.go:204] [ 1155: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.602430 644063 task_exit.go:204] [ 1155: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.602440 644063 task_exit.go:204] [ 1155: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.602462 644063 task_exit.go:204] [ 1155: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.602470 644063 task_exit.go:204] [ 1155: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.602488 644063 task_exit.go:204] [ 1155: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.603874 644063 task_exit.go:204] [ 1155: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.603983 644063 task_exit.go:204] [ 1155: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.604060 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.604097 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.604125 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.605624 644063 task_exit.go:204] [ 1155: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.606367 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.607783 644063 syscalls.go:262] [ 1161: 1161] Allocating stack with size of 8388608 bytes D0713 05:18:06.607897 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.609749 644063 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.609813 644063 usertrap_amd64.go:106] [ 1161: 1161] Map a usertrap vma at 69000 D0713 05:18:06.609909 644063 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc0014c2ae0 1 D0713 05:18:06.609974 644063 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:06.613644 644063 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.613681 644063 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc0014c2ae0 2 D0713 05:18:06.613717 644063 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:06.614438 644063 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.614464 644063 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc0014c2ae0 3 D0713 05:18:06.614473 644063 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:06.620645 644063 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.620691 644063 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc0014c2ae0 4 D0713 05:18:06.620706 644063 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:06.622029 644063 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.622048 644063 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc0014c2ae0 5 D0713 05:18:06.622061 644063 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:06.622157 644063 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.622180 644063 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc0014c2ae0 6 D0713 05:18:06.622192 644063 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:06.622542 644063 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.622574 644063 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc0014c2ae0 7 D0713 05:18:06.622584 644063 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:06.622792 644063 usertrap_amd64.go:212] [ 1161: 1162] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.622900 644063 usertrap_amd64.go:122] [ 1161: 1162] Allocate a new trap: 0xc0014c2ae0 8 D0713 05:18:06.622965 644063 usertrap_amd64.go:225] [ 1161: 1162] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:06.623080 644063 usertrap_amd64.go:212] [ 1161: 1162] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.623485 644063 usertrap_amd64.go:122] [ 1161: 1162] Allocate a new trap: 0xc0014c2ae0 9 D0713 05:18:06.623516 644063 usertrap_amd64.go:225] [ 1161: 1162] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:06.623535 644063 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.623543 644063 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc0014c2ae0 10 D0713 05:18:06.623552 644063 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:06.633378 644063 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.633550 644063 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc0014c2ae0 11 D0713 05:18:06.633586 644063 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:06.633998 644063 usertrap_amd64.go:212] [ 1161: 1162] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.634066 644063 usertrap_amd64.go:122] [ 1161: 1162] Allocate a new trap: 0xc0014c2ae0 12 D0713 05:18:06.634086 644063 usertrap_amd64.go:225] [ 1161: 1162] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:06.634564 644063 usertrap_amd64.go:212] [ 1161: 1162] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.634597 644063 usertrap_amd64.go:122] [ 1161: 1162] Allocate a new trap: 0xc0014c2ae0 13 D0713 05:18:06.634609 644063 usertrap_amd64.go:225] [ 1161: 1162] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) executing program D0713 05:18:06.634730 644063 task_signals.go:470] [ 1161: 1161] Notified of signal 23 D0713 05:18:06.634813 644063 task_signals.go:220] [ 1161: 1161] Signal 23: delivering to handler D0713 05:18:06.644840 644063 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.644896 644063 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc0014c2ae0 14 D0713 05:18:06.644913 644063 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:06.645018 644063 task_exit.go:204] [ 1161: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.645051 644063 task_exit.go:204] [ 1161: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.645057 644063 task_signals.go:204] [ 1161: 1163] Signal 1161, PID: 1163, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.645092 644063 task_signals.go:204] [ 1161: 1164] Signal 1161, PID: 1164, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.645109 644063 task_exit.go:204] [ 1161: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.645148 644063 task_exit.go:204] [ 1161: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.645156 644063 task_exit.go:204] [ 1161: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.645176 644063 task_exit.go:204] [ 1161: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.645184 644063 task_exit.go:204] [ 1161: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.645225 644063 task_exit.go:204] [ 1161: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.645251 644063 task_signals.go:204] [ 1161: 1165] Signal 1161, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.645263 644063 task_exit.go:204] [ 1161: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.645270 644063 task_exit.go:204] [ 1161: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.645275 644063 task_exit.go:204] [ 1161: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.645286 644063 task_signals.go:204] [ 1161: 1162] Signal 1161, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.645295 644063 task_exit.go:204] [ 1161: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.646778 644063 task_exit.go:204] [ 1161: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.646817 644063 task_exit.go:204] [ 1161: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.646839 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.646867 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.646877 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.646987 644063 task_exit.go:204] [ 1161: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.647581 644063 task_signals.go:470] [ 6: 13] Notified of signal 23 D0713 05:18:06.647643 644063 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 05:18:06.648186 644063 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.649533 644063 syscalls.go:262] [ 1166: 1166] Allocating stack with size of 8388608 bytes D0713 05:18:06.649744 644063 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.651279 644063 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.651318 644063 usertrap_amd64.go:106] [ 1166: 1166] Map a usertrap vma at 6a000 D0713 05:18:06.651453 644063 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc0002ae2a0 1 D0713 05:18:06.651490 644063 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:06.651880 644063 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.651914 644063 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc0002ae2a0 2 D0713 05:18:06.651930 644063 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:06.652602 644063 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.652632 644063 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc0002ae2a0 3 D0713 05:18:06.652668 644063 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:06.660158 644063 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.660253 644063 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc0002ae2a0 4 D0713 05:18:06.660313 644063 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:06.661734 644063 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.661766 644063 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc0002ae2a0 5 D0713 05:18:06.661778 644063 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:06.661950 644063 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.661990 644063 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc0002ae2a0 6 D0713 05:18:06.662001 644063 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:06.662264 644063 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.662291 644063 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc0002ae2a0 7 D0713 05:18:06.662300 644063 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:06.662504 644063 usertrap_amd64.go:212] [ 1166: 1167] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.662532 644063 usertrap_amd64.go:122] [ 1166: 1167] Allocate a new trap: 0xc0002ae2a0 8 D0713 05:18:06.662580 644063 usertrap_amd64.go:225] [ 1166: 1167] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:06.662692 644063 usertrap_amd64.go:212] [ 1166: 1167] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.662715 644063 usertrap_amd64.go:122] [ 1166: 1167] Allocate a new trap: 0xc0002ae2a0 9 D0713 05:18:06.662723 644063 usertrap_amd64.go:225] [ 1166: 1167] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:06.663057 644063 usertrap_amd64.go:212] [ 1166: 1167] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.663078 644063 usertrap_amd64.go:122] [ 1166: 1167] Allocate a new trap: 0xc0002ae2a0 10 D0713 05:18:06.663088 644063 usertrap_amd64.go:225] [ 1166: 1167] Apply the binary patch addr 46b020 trap addr 6a320 ([184 39 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:06.663156 644063 usertrap_amd64.go:212] [ 1166: 1167] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.663167 644063 usertrap_amd64.go:122] [ 1166: 1167] Allocate a new trap: 0xc0002ae2a0 11 D0713 05:18:06.663199 644063 usertrap_amd64.go:225] [ 1166: 1167] Apply the binary patch addr 46b04f trap addr 6a370 ([184 234 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:06.663274 644063 task_signals.go:481] [ 1166: 1166] No task notified of signal 23 D0713 05:18:06.663509 644063 task_signals.go:220] [ 1166: 1166] Signal 23: delivering to handler D0713 05:18:06.663628 644063 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.663662 644063 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc0002ae2a0 12 D0713 05:18:06.663678 644063 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46b57c trap addr 6a3c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:06.672060 644063 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.672111 644063 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc0002ae2a0 13 D0713 05:18:06.672128 644063 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:06.676061 644063 task_signals.go:470] [ 1166: 1166] Notified of signal 23 D0713 05:18:06.676135 644063 task_signals.go:220] [ 1166: 1166] Signal 23: delivering to handler D0713 05:18:06.683577 644063 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.683631 644063 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc0002ae2a0 14 D0713 05:18:06.683650 644063 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:06.683696 644063 task_exit.go:204] [ 1166: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.683721 644063 task_exit.go:204] [ 1166: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.683752 644063 task_signals.go:204] [ 1166: 1168] Signal 1166, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.683768 644063 task_signals.go:204] [ 1166: 1170] Signal 1166, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.683778 644063 task_exit.go:204] [ 1166: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.683793 644063 task_signals.go:204] [ 1166: 1169] Signal 1166, PID: 1169, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.683796 644063 task_exit.go:204] [ 1166: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.683807 644063 task_exit.go:204] [ 1166: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.683823 644063 task_signals.go:204] [ 1166: 1167] Signal 1166, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.683834 644063 task_exit.go:204] [ 1166: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.683841 644063 task_signals.go:204] [ 1166: 1171] Signal 1166, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.683860 644063 task_exit.go:204] [ 1166: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.683866 644063 task_exit.go:204] [ 1166: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.683876 644063 task_exit.go:204] [ 1166: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.683884 644063 task_exit.go:204] [ 1166: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.683937 644063 task_exit.go:204] [ 1166: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.683948 644063 task_exit.go:204] [ 1166: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.683972 644063 task_exit.go:204] [ 1166: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.683978 644063 task_exit.go:204] [ 1166: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.683984 644063 task_exit.go:204] [ 1166: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.685341 644063 task_exit.go:204] [ 1166: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.685368 644063 task_exit.go:204] [ 1166: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.685389 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.685432 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.685448 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.685548 644063 task_exit.go:204] [ 1166: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.686626 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.688294 644063 syscalls.go:262] [ 1172: 1172] Allocating stack with size of 8388608 bytes D0713 05:18:06.688421 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.689558 644063 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.689608 644063 usertrap_amd64.go:106] [ 1172: 1172] Map a usertrap vma at 61000 D0713 05:18:06.689877 644063 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0014c2c00 1 D0713 05:18:06.689941 644063 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:06.691157 644063 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.691186 644063 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0014c2c00 2 D0713 05:18:06.691198 644063 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:06.692841 644063 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.692871 644063 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0014c2c00 3 D0713 05:18:06.692883 644063 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:06.700045 644063 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.700090 644063 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0014c2c00 4 D0713 05:18:06.700105 644063 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:06.701522 644063 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.701651 644063 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0014c2c00 5 D0713 05:18:06.701703 644063 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:06.701746 644063 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.701762 644063 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0014c2c00 6 D0713 05:18:06.701770 644063 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:06.701952 644063 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.701974 644063 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0014c2c00 7 D0713 05:18:06.701982 644063 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:06.702212 644063 usertrap_amd64.go:212] [ 1172: 1173] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.702297 644063 usertrap_amd64.go:122] [ 1172: 1173] Allocate a new trap: 0xc0014c2c00 8 D0713 05:18:06.702317 644063 usertrap_amd64.go:225] [ 1172: 1173] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:06.702524 644063 usertrap_amd64.go:212] [ 1172: 1173] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:06.702558 644063 usertrap_amd64.go:122] [ 1172: 1173] Allocate a new trap: 0xc0014c2c00 9 D0713 05:18:06.702569 644063 usertrap_amd64.go:225] [ 1172: 1173] Apply the binary patch addr 46b6e0 trap addr 612d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:06.702624 644063 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.702637 644063 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0014c2c00 10 D0713 05:18:06.702651 644063 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:06.702708 644063 usertrap_amd64.go:212] [ 1172: 1173] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.702735 644063 usertrap_amd64.go:122] [ 1172: 1173] Allocate a new trap: 0xc0014c2c00 11 D0713 05:18:06.702745 644063 usertrap_amd64.go:225] [ 1172: 1173] Apply the binary patch addr 46af76 trap addr 61370 ([184 35 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:06.711224 644063 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.711245 644063 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0014c2c00 12 D0713 05:18:06.711256 644063 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:06.714112 644063 usertrap_amd64.go:212] [ 1172: 1173] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.714144 644063 usertrap_amd64.go:122] [ 1172: 1173] Allocate a new trap: 0xc0014c2c00 13 D0713 05:18:06.714156 644063 usertrap_amd64.go:225] [ 1172: 1173] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:06.714208 644063 usertrap_amd64.go:212] [ 1172: 1173] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.714225 644063 usertrap_amd64.go:122] [ 1172: 1173] Allocate a new trap: 0xc0014c2c00 14 D0713 05:18:06.714233 644063 usertrap_amd64.go:225] [ 1172: 1173] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:06.714371 644063 task_signals.go:470] [ 1172: 1172] Notified of signal 23 D0713 05:18:06.714449 644063 task_signals.go:220] [ 1172: 1172] Signal 23: delivering to handler D0713 05:18:06.723239 644063 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.723292 644063 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0014c2c00 15 D0713 05:18:06.723309 644063 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 05:18:06.723366 644063 task_exit.go:204] [ 1172: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.723405 644063 task_signals.go:204] [ 1172: 1173] Signal 1172, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.723505 644063 task_signals.go:204] [ 1172: 1174] Signal 1172, PID: 1174, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.723496 644063 task_signals.go:204] [ 1172: 1175] Signal 1172, PID: 1175, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.724308 644063 task_exit.go:204] [ 1172: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.724371 644063 task_exit.go:204] [ 1172: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.724388 644063 task_exit.go:204] [ 1172: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.724402 644063 task_exit.go:204] [ 1172: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.724416 644063 task_exit.go:204] [ 1172: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.724424 644063 task_exit.go:204] [ 1172: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.724427 644063 task_exit.go:204] [ 1172: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.724434 644063 task_exit.go:204] [ 1172: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.725647 644063 task_exit.go:204] [ 1172: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.725661 644063 task_exit.go:204] [ 1172: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.725671 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.726871 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.726902 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.727038 644063 task_exit.go:204] [ 1172: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.727808 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.729452 644063 syscalls.go:262] [ 1176: 1176] Allocating stack with size of 8388608 bytes D0713 05:18:06.729756 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.741194 644063 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.741351 644063 usertrap_amd64.go:106] [ 1176: 1176] Map a usertrap vma at 66000 D0713 05:18:06.741548 644063 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000c03920 1 D0713 05:18:06.741596 644063 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:06.745169 644063 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.745197 644063 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000c03920 2 D0713 05:18:06.745215 644063 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:06.745610 644063 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.745628 644063 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000c03920 3 D0713 05:18:06.745639 644063 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:06.751882 644063 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.751918 644063 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000c03920 4 D0713 05:18:06.751931 644063 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:06.753002 644063 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.753032 644063 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000c03920 5 D0713 05:18:06.753041 644063 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:06.753094 644063 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.753121 644063 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000c03920 6 D0713 05:18:06.753129 644063 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:06.753351 644063 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.753375 644063 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000c03920 7 D0713 05:18:06.753383 644063 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:06.753605 644063 usertrap_amd64.go:212] [ 1176: 1177] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.753627 644063 usertrap_amd64.go:122] [ 1176: 1177] Allocate a new trap: 0xc000c03920 8 D0713 05:18:06.753640 644063 usertrap_amd64.go:225] [ 1176: 1177] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:06.753944 644063 usertrap_amd64.go:212] [ 1176: 1177] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.753955 644063 usertrap_amd64.go:122] [ 1176: 1177] Allocate a new trap: 0xc000c03920 9 D0713 05:18:06.753966 644063 usertrap_amd64.go:225] [ 1176: 1177] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:06.753990 644063 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.753997 644063 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000c03920 10 D0713 05:18:06.754004 644063 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:06.754211 644063 usertrap_amd64.go:212] [ 1176: 1179] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:06.754268 644063 usertrap_amd64.go:122] [ 1176: 1179] Allocate a new trap: 0xc000c03920 11 D0713 05:18:06.754285 644063 usertrap_amd64.go:225] [ 1176: 1179] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:06.763339 644063 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.763376 644063 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000c03920 12 D0713 05:18:06.763390 644063 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:06.766569 644063 usertrap_amd64.go:212] [ 1176: 1177] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.766605 644063 usertrap_amd64.go:122] [ 1176: 1177] Allocate a new trap: 0xc000c03920 13 D0713 05:18:06.766619 644063 usertrap_amd64.go:225] [ 1176: 1177] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:06.766673 644063 usertrap_amd64.go:212] [ 1176: 1177] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.766692 644063 usertrap_amd64.go:122] [ 1176: 1177] Allocate a new trap: 0xc000c03920 14 D0713 05:18:06.766704 644063 usertrap_amd64.go:225] [ 1176: 1177] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:06.766778 644063 task_signals.go:470] [ 1176: 1176] Notified of signal 23 D0713 05:18:06.766880 644063 task_signals.go:220] [ 1176: 1176] Signal 23: delivering to handler D0713 05:18:06.775992 644063 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.776031 644063 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000c03920 15 D0713 05:18:06.776047 644063 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 05:18:06.776129 644063 task_exit.go:204] [ 1176: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.776159 644063 task_exit.go:204] [ 1176: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.776163 644063 task_signals.go:204] [ 1176: 1178] Signal 1176, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.776183 644063 task_signals.go:204] [ 1176: 1179] Signal 1176, PID: 1179, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.776191 644063 task_exit.go:204] [ 1176: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.776204 644063 task_exit.go:204] [ 1176: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.776204 644063 task_signals.go:204] [ 1176: 1180] Signal 1176, PID: 1180, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.776211 644063 task_exit.go:204] [ 1176: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.776225 644063 task_exit.go:204] [ 1176: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.776234 644063 task_signals.go:204] [ 1176: 1177] Signal 1176, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.776247 644063 task_exit.go:204] [ 1176: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.776253 644063 task_exit.go:204] [ 1176: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.776260 644063 task_exit.go:204] [ 1176: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.776268 644063 task_exit.go:204] [ 1176: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.776273 644063 task_exit.go:204] [ 1176: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.776284 644063 task_exit.go:204] [ 1176: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.777568 644063 task_exit.go:204] [ 1176: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.777589 644063 task_exit.go:204] [ 1176: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.777603 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.777666 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.777678 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.777833 644063 task_exit.go:204] [ 1176: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.778678 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.780242 644063 syscalls.go:262] [ 1181: 1181] Allocating stack with size of 8388608 bytes D0713 05:18:06.780491 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.781824 644063 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.781859 644063 usertrap_amd64.go:106] [ 1181: 1181] Map a usertrap vma at 60000 D0713 05:18:06.782629 644063 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0014c3140 1 D0713 05:18:06.782671 644063 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:06.783063 644063 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.783084 644063 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0014c3140 2 D0713 05:18:06.783094 644063 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:06.783686 644063 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.783712 644063 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0014c3140 3 D0713 05:18:06.783724 644063 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:06.790230 644063 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.790254 644063 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0014c3140 4 D0713 05:18:06.790264 644063 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:06.791513 644063 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.791539 644063 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0014c3140 5 D0713 05:18:06.791550 644063 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:06.791598 644063 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.791613 644063 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0014c3140 6 D0713 05:18:06.791620 644063 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:06.791844 644063 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.791860 644063 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0014c3140 7 D0713 05:18:06.791866 644063 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:06.792050 644063 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.792076 644063 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc0014c3140 8 D0713 05:18:06.792136 644063 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:06.792314 644063 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.792335 644063 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0014c3140 9 D0713 05:18:06.792345 644063 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:06.792365 644063 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.792373 644063 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc0014c3140 10 D0713 05:18:06.792380 644063 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:06.798971 644063 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.798994 644063 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0014c3140 11 D0713 05:18:06.799006 644063 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:06.803127 644063 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.803155 644063 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc0014c3140 12 D0713 05:18:06.803166 644063 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:06.803202 644063 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.803210 644063 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc0014c3140 13 D0713 05:18:06.803217 644063 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:06.803232 644063 task_signals.go:470] [ 1181: 1181] Notified of signal 23 D0713 05:18:06.803357 644063 task_signals.go:220] [ 1181: 1181] Signal 23: delivering to handler D0713 05:18:06.809997 644063 sys_signal.go:495] [ 1181: 1181] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0713 05:18:06.810070 644063 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.810086 644063 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0014c3140 14 D0713 05:18:06.810098 644063 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:06.810840 644063 task_exit.go:204] [ 1181: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.810882 644063 task_signals.go:204] [ 1181: 1182] Signal 1181, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.810878 644063 task_exit.go:204] [ 1181: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.810928 644063 task_signals.go:204] [ 1181: 1184] Signal 1181, PID: 1184, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.810937 644063 task_exit.go:204] [ 1181: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.810960 644063 task_signals.go:204] [ 1181: 1185] Signal 1181, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.810964 644063 task_signals.go:204] [ 1181: 1183] Signal 1181, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.810977 644063 task_exit.go:204] [ 1181: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.810998 644063 task_exit.go:204] [ 1181: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.811012 644063 task_exit.go:204] [ 1181: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.811019 644063 task_exit.go:204] [ 1181: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.811023 644063 task_exit.go:204] [ 1181: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.811030 644063 task_exit.go:204] [ 1181: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.811034 644063 task_exit.go:204] [ 1181: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.811039 644063 task_exit.go:204] [ 1181: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.811045 644063 task_exit.go:204] [ 1181: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.812060 644063 task_exit.go:204] [ 1181: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.812101 644063 task_exit.go:204] [ 1181: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.812114 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.812150 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.812159 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.812269 644063 task_exit.go:204] [ 1181: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.813233 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.814790 644063 syscalls.go:262] [ 1186: 1186] Allocating stack with size of 8388608 bytes D0713 05:18:06.814919 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.817174 644063 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.817220 644063 usertrap_amd64.go:106] [ 1186: 1186] Map a usertrap vma at 61000 D0713 05:18:06.817278 644063 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000761fb0 1 D0713 05:18:06.817297 644063 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:06.817725 644063 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.817749 644063 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000761fb0 2 D0713 05:18:06.817759 644063 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:06.818566 644063 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.818598 644063 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000761fb0 3 D0713 05:18:06.818605 644063 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:06.824621 644063 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.824673 644063 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000761fb0 4 D0713 05:18:06.824687 644063 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:06.826556 644063 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.826595 644063 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000761fb0 5 D0713 05:18:06.826612 644063 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:06.826709 644063 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.826727 644063 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000761fb0 6 D0713 05:18:06.826733 644063 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:06.827051 644063 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.827073 644063 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000761fb0 7 D0713 05:18:06.827081 644063 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:06.827299 644063 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.827339 644063 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc000761fb0 8 D0713 05:18:06.827352 644063 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:06.827648 644063 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.827673 644063 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc000761fb0 9 D0713 05:18:06.827714 644063 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:06.827899 644063 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.827927 644063 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000761fb0 10 D0713 05:18:06.827937 644063 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:06.835009 644063 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.835047 644063 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000761fb0 11 D0713 05:18:06.835060 644063 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:06.838520 644063 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.838720 644063 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc000761fb0 12 D0713 05:18:06.838756 644063 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:06.838818 644063 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.838828 644063 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc000761fb0 13 D0713 05:18:06.838837 644063 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:06.838861 644063 task_signals.go:470] [ 1186: 1186] Notified of signal 23 D0713 05:18:06.838945 644063 task_signals.go:220] [ 1186: 1186] Signal 23: delivering to handler D0713 05:18:06.846045 644063 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.846077 644063 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000761fb0 14 D0713 05:18:06.846090 644063 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:06.846131 644063 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.846170 644063 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.846197 644063 task_signals.go:204] [ 1186: 1187] Signal 1186, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.846217 644063 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.846225 644063 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.846230 644063 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.846253 644063 task_signals.go:204] [ 1186: 1188] Signal 1186, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.846263 644063 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.846270 644063 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.846275 644063 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.846289 644063 task_signals.go:204] [ 1186: 1189] Signal 1186, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.846297 644063 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.846340 644063 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.846345 644063 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.846358 644063 task_signals.go:204] [ 1186: 1190] Signal 1186, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.846367 644063 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.847678 644063 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.847701 644063 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.847715 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.850887 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.850938 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.851187 644063 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.851943 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.853357 644063 syscalls.go:262] [ 1191: 1191] Allocating stack with size of 8388608 bytes D0713 05:18:06.853476 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.854475 644063 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.854514 644063 usertrap_amd64.go:106] [ 1191: 1191] Map a usertrap vma at 69000 D0713 05:18:06.854578 644063 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc00044cf00 1 D0713 05:18:06.854597 644063 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:06.854927 644063 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.854959 644063 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc00044cf00 2 D0713 05:18:06.854971 644063 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:06.855494 644063 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.855571 644063 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc00044cf00 3 D0713 05:18:06.855597 644063 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:06.862108 644063 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.862158 644063 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc00044cf00 4 D0713 05:18:06.862176 644063 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:06.863823 644063 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.863856 644063 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc00044cf00 5 D0713 05:18:06.863868 644063 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:06.863923 644063 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.863930 644063 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc00044cf00 6 D0713 05:18:06.863967 644063 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:06.864374 644063 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.864399 644063 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc00044cf00 7 D0713 05:18:06.864420 644063 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:06.864615 644063 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.864640 644063 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc00044cf00 8 D0713 05:18:06.864655 644063 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:06.865090 644063 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.865116 644063 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc00044cf00 9 D0713 05:18:06.865124 644063 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:06.865291 644063 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.865313 644063 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc00044cf00 10 D0713 05:18:06.865329 644063 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:06.866199 644063 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:06.866237 644063 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc00044cf00 11 D0713 05:18:06.866252 644063 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:06.866469 644063 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.866504 644063 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc00044cf00 12 D0713 05:18:06.866516 644063 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:06.866587 644063 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.866596 644063 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc00044cf00 13 D0713 05:18:06.866604 644063 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:06.866634 644063 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 05:18:06.866661 644063 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 05:18:06.873988 644063 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.874063 644063 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc00044cf00 14 D0713 05:18:06.874076 644063 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46af29 trap addr 69460 ([184 37 1 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:06.876769 644063 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 05:18:06.876864 644063 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 05:18:06.877014 644063 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 05:18:06.877072 644063 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 05:18:06.884520 644063 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.884572 644063 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc00044cf00 15 D0713 05:18:06.884590 644063 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 05:18:06.884642 644063 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.884678 644063 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.884708 644063 task_signals.go:204] [ 1191: 1192] Signal 1191, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.884733 644063 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.884757 644063 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.884762 644063 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.884784 644063 task_signals.go:204] [ 1191: 1193] Signal 1191, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.884795 644063 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.884803 644063 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.884808 644063 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.884819 644063 task_signals.go:204] [ 1191: 1194] Signal 1191, PID: 1194, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.884838 644063 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.884846 644063 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.884851 644063 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.884868 644063 task_signals.go:204] [ 1191: 1195] Signal 1191, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.884886 644063 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.886187 644063 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.886220 644063 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.886239 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.886305 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.886317 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.886538 644063 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.887276 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.888722 644063 syscalls.go:262] [ 1196: 1196] Allocating stack with size of 8388608 bytes D0713 05:18:06.889016 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.890048 644063 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.890097 644063 usertrap_amd64.go:106] [ 1196: 1196] Map a usertrap vma at 64000 D0713 05:18:06.890208 644063 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000c03dd0 1 D0713 05:18:06.890238 644063 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:06.890583 644063 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.890610 644063 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000c03dd0 2 D0713 05:18:06.890622 644063 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:06.891271 644063 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.891301 644063 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000c03dd0 3 D0713 05:18:06.891312 644063 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:06.897215 644063 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.897272 644063 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000c03dd0 4 D0713 05:18:06.897310 644063 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:06.898558 644063 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.898593 644063 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000c03dd0 5 D0713 05:18:06.898608 644063 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:06.898646 644063 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.898653 644063 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000c03dd0 6 D0713 05:18:06.898660 644063 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:06.898835 644063 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.898855 644063 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000c03dd0 7 D0713 05:18:06.898862 644063 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:06.899036 644063 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.899059 644063 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000c03dd0 8 D0713 05:18:06.899067 644063 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:06.899192 644063 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.899209 644063 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000c03dd0 9 D0713 05:18:06.899220 644063 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:06.899366 644063 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.899393 644063 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000c03dd0 10 D0713 05:18:06.899402 644063 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:06.908776 644063 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.908818 644063 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000c03dd0 11 D0713 05:18:06.908830 644063 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:06.911419 644063 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.911508 644063 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000c03dd0 12 D0713 05:18:06.911528 644063 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:06.911572 644063 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.911588 644063 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000c03dd0 13 D0713 05:18:06.911598 644063 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:06.911701 644063 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0713 05:18:06.911778 644063 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0713 05:18:06.921162 644063 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.921210 644063 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000c03dd0 14 D0713 05:18:06.921224 644063 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:06.921286 644063 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.921313 644063 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.921348 644063 task_signals.go:204] [ 1196: 1197] Signal 1196, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.921370 644063 task_signals.go:204] [ 1196: 1200] Signal 1196, PID: 1200, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.921380 644063 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.921371 644063 task_signals.go:204] [ 1196: 1198] Signal 1196, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.921388 644063 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.921410 644063 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.921370 644063 task_signals.go:204] [ 1196: 1199] Signal 1196, PID: 1199, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.921424 644063 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.921437 644063 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.921450 644063 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.921463 644063 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.921472 644063 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.921478 644063 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.921487 644063 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.922809 644063 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.922841 644063 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.922881 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.922910 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.922927 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.922995 644063 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.923704 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.925276 644063 syscalls.go:262] [ 1201: 1201] Allocating stack with size of 8388608 bytes D0713 05:18:06.925421 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.926781 644063 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.926829 644063 usertrap_amd64.go:106] [ 1201: 1201] Map a usertrap vma at 61000 D0713 05:18:06.926946 644063 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0014c36e0 1 D0713 05:18:06.926972 644063 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:06.927331 644063 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.927403 644063 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0014c36e0 2 D0713 05:18:06.927452 644063 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:06.928086 644063 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.928125 644063 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0014c36e0 3 D0713 05:18:06.928136 644063 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:06.935642 644063 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.935679 644063 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0014c36e0 4 D0713 05:18:06.935692 644063 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:06.937032 644063 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.937081 644063 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0014c36e0 5 D0713 05:18:06.937098 644063 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:06.937145 644063 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.937157 644063 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0014c36e0 6 D0713 05:18:06.937167 644063 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:06.937468 644063 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.937475 644063 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0014c36e0 7 D0713 05:18:06.937482 644063 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:06.937662 644063 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.937673 644063 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0014c36e0 8 D0713 05:18:06.937681 644063 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:06.937867 644063 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.937877 644063 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0014c36e0 9 D0713 05:18:06.937888 644063 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:06.937963 644063 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.937977 644063 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0014c36e0 10 D0713 05:18:06.937982 644063 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:06.945938 644063 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.945968 644063 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0014c36e0 11 D0713 05:18:06.945981 644063 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:06.949644 644063 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.949706 644063 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0014c36e0 12 D0713 05:18:06.949719 644063 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:06.949791 644063 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.949807 644063 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0014c36e0 13 D0713 05:18:06.949813 644063 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:06.949830 644063 task_signals.go:470] [ 1201: 1201] Notified of signal 23 D0713 05:18:06.949912 644063 task_signals.go:220] [ 1201: 1201] Signal 23: delivering to handler D0713 05:18:06.956077 644063 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.956128 644063 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0014c36e0 14 D0713 05:18:06.956173 644063 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:06.956220 644063 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.956256 644063 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.956288 644063 task_signals.go:204] [ 1201: 1204] Signal 1201, PID: 1204, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.956301 644063 task_signals.go:204] [ 1201: 1205] Signal 1201, PID: 1205, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.956280 644063 task_signals.go:204] [ 1201: 1202] Signal 1201, PID: 1202, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.956334 644063 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.956350 644063 task_signals.go:204] [ 1201: 1203] Signal 1201, PID: 1203, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.956364 644063 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.956369 644063 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.956385 644063 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.956391 644063 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.956407 644063 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.956428 644063 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.956441 644063 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.956445 644063 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.956451 644063 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.957682 644063 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.957719 644063 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.957734 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.957790 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.957800 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.957890 644063 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.958808 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.960283 644063 syscalls.go:262] [ 1206: 1206] Allocating stack with size of 8388608 bytes D0713 05:18:06.960533 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.961896 644063 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.961959 644063 usertrap_amd64.go:106] [ 1206: 1206] Map a usertrap vma at 69000 D0713 05:18:06.962065 644063 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc00057a5d0 1 D0713 05:18:06.962097 644063 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:06.962588 644063 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.962602 644063 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc00057a5d0 2 D0713 05:18:06.962614 644063 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:06.963193 644063 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.963222 644063 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc00057a5d0 3 D0713 05:18:06.963233 644063 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:06.969244 644063 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.969285 644063 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc00057a5d0 4 D0713 05:18:06.969299 644063 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:06.970342 644063 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.970359 644063 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc00057a5d0 5 D0713 05:18:06.970368 644063 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:06.970436 644063 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.970458 644063 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc00057a5d0 6 D0713 05:18:06.970480 644063 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:06.971124 644063 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.971153 644063 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc00057a5d0 7 D0713 05:18:06.971162 644063 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:06.971304 644063 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.971329 644063 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc00057a5d0 8 D0713 05:18:06.971340 644063 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:06.971583 644063 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.971606 644063 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc00057a5d0 9 D0713 05:18:06.971616 644063 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:06.971638 644063 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.971653 644063 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc00057a5d0 10 D0713 05:18:06.971658 644063 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:06.978871 644063 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.978918 644063 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc00057a5d0 11 D0713 05:18:06.978931 644063 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:06.982594 644063 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.982636 644063 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc00057a5d0 12 D0713 05:18:06.982652 644063 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:06.982689 644063 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.982696 644063 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc00057a5d0 13 D0713 05:18:06.982702 644063 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:06.982719 644063 task_signals.go:470] [ 1206: 1206] Notified of signal 23 D0713 05:18:06.982775 644063 task_signals.go:220] [ 1206: 1206] Signal 23: delivering to handler D0713 05:18:06.989686 644063 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.989735 644063 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc00057a5d0 14 D0713 05:18:06.989753 644063 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:06.989827 644063 task_exit.go:204] [ 1206: 1206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.989855 644063 task_exit.go:204] [ 1206: 1206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.989900 644063 task_signals.go:204] [ 1206: 1207] Signal 1206, PID: 1207, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.989930 644063 task_exit.go:204] [ 1206: 1207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.989939 644063 task_exit.go:204] [ 1206: 1207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.989944 644063 task_exit.go:204] [ 1206: 1207] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.989980 644063 task_signals.go:204] [ 1206: 1208] Signal 1206, PID: 1208, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.989991 644063 task_exit.go:204] [ 1206: 1208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.990000 644063 task_exit.go:204] [ 1206: 1208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.990015 644063 task_exit.go:204] [ 1206: 1208] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.990032 644063 task_signals.go:204] [ 1206: 1209] Signal 1206, PID: 1209, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.990043 644063 task_exit.go:204] [ 1206: 1209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.990050 644063 task_exit.go:204] [ 1206: 1209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.990066 644063 task_exit.go:204] [ 1206: 1209] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.990079 644063 task_signals.go:204] [ 1206: 1210] Signal 1206, PID: 1210, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.990089 644063 task_exit.go:204] [ 1206: 1210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.991439 644063 task_exit.go:204] [ 1206: 1210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.991478 644063 task_exit.go:204] [ 1206: 1210] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.991503 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.991563 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.991618 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.991897 644063 task_exit.go:204] [ 1206: 1206] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.992004 644063 task_signals.go:470] [ 6: 20] Notified of signal 23 D0713 05:18:06.992087 644063 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler D0713 05:18:06.992546 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.994219 644063 syscalls.go:262] [ 1211: 1211] Allocating stack with size of 8388608 bytes D0713 05:18:06.994609 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.995816 644063 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.995942 644063 usertrap_amd64.go:106] [ 1211: 1211] Map a usertrap vma at 6a000 D0713 05:18:06.996036 644063 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc00057aae0 1 D0713 05:18:06.996072 644063 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:06.996514 644063 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.996536 644063 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc00057aae0 2 D0713 05:18:06.996545 644063 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:06.997351 644063 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.997405 644063 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc00057aae0 3 D0713 05:18:06.997422 644063 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:07.004534 644063 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:07.004586 644063 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc00057aae0 4 D0713 05:18:07.004603 644063 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:07.005905 644063 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:07.006017 644063 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc00057aae0 5 D0713 05:18:07.006074 644063 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:07.007133 644063 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b214:sysno 13 D0713 05:18:07.007156 644063 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc00057aae0 6 D0713 05:18:07.007165 644063 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:07.007464 644063 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:07.007480 644063 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc00057aae0 7 D0713 05:18:07.007487 644063 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:07.007630 644063 usertrap_amd64.go:212] [ 1211: 1212] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:07.007645 644063 usertrap_amd64.go:122] [ 1211: 1212] Allocate a new trap: 0xc00057aae0 8 D0713 05:18:07.007651 644063 usertrap_amd64.go:225] [ 1211: 1212] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:07.007800 644063 usertrap_amd64.go:212] [ 1211: 1212] Found the pattern at ip 46af76:sysno 35 D0713 05:18:07.007822 644063 usertrap_amd64.go:122] [ 1211: 1212] Allocate a new trap: 0xc00057aae0 9 D0713 05:18:07.007841 644063 usertrap_amd64.go:225] [ 1211: 1212] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:07.007995 644063 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:07.008015 644063 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc00057aae0 10 D0713 05:18:07.008025 644063 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:07.017442 644063 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46af29:sysno 293 D0713 05:18:07.017552 644063 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc00057aae0 11 D0713 05:18:07.017580 644063 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:07.019955 644063 usertrap_amd64.go:212] [ 1211: 1212] Found the pattern at ip 46b020:sysno 39 D0713 05:18:07.020002 644063 usertrap_amd64.go:122] [ 1211: 1212] Allocate a new trap: 0xc00057aae0 12 D0713 05:18:07.020019 644063 usertrap_amd64.go:225] [ 1211: 1212] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:07.020074 644063 usertrap_amd64.go:212] [ 1211: 1212] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:07.020081 644063 usertrap_amd64.go:122] [ 1211: 1212] Allocate a new trap: 0xc00057aae0 13 D0713 05:18:07.020112 644063 usertrap_amd64.go:225] [ 1211: 1212] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:07.020178 644063 task_signals.go:470] [ 1211: 1211] Notified of signal 23 D0713 05:18:07.020240 644063 task_signals.go:220] [ 1211: 1211] Signal 23: delivering to handler D0713 05:18:07.028299 644063 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:07.028351 644063 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc00057aae0 14 D0713 05:18:07.028384 644063 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:07.028436 644063 task_exit.go:204] [ 1211: 1211] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.028461 644063 task_exit.go:204] [ 1211: 1211] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.028493 644063 task_signals.go:204] [ 1211: 1215] Signal 1211, PID: 1215, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.028508 644063 task_exit.go:204] [ 1211: 1215] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.028487 644063 task_signals.go:204] [ 1211: 1212] Signal 1211, PID: 1212, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.028517 644063 task_exit.go:204] [ 1211: 1215] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.028513 644063 task_signals.go:204] [ 1211: 1214] Signal 1211, PID: 1214, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.028523 644063 task_exit.go:204] [ 1211: 1215] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.028505 644063 task_signals.go:204] [ 1211: 1213] Signal 1211, PID: 1213, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.028560 644063 task_exit.go:204] [ 1211: 1213] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.028583 644063 task_exit.go:204] [ 1211: 1213] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.028600 644063 task_exit.go:204] [ 1211: 1213] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.028612 644063 task_exit.go:204] [ 1211: 1212] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.028622 644063 task_exit.go:204] [ 1211: 1212] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.028627 644063 task_exit.go:204] [ 1211: 1212] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.028657 644063 task_exit.go:204] [ 1211: 1214] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.029906 644063 task_exit.go:204] [ 1211: 1214] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.029937 644063 task_exit.go:204] [ 1211: 1214] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.029957 644063 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:07.029984 644063 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:07.029998 644063 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:07.030206 644063 task_exit.go:204] [ 1211: 1211] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.031006 644063 task_stop.go:118] [ 6: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:07.032577 644063 syscalls.go:262] [ 1216: 1216] Allocating stack with size of 8388608 bytes D0713 05:18:07.032700 644063 task_stop.go:138] [ 6: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:07.034995 644063 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:07.035037 644063 usertrap_amd64.go:106] [ 1216: 1216] Map a usertrap vma at 67000 D0713 05:18:07.035119 644063 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc00057acf0 1 D0713 05:18:07.035149 644063 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:07.035738 644063 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:07.035767 644063 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc00057acf0 2 D0713 05:18:07.035779 644063 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:07.036421 644063 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:07.036449 644063 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc00057acf0 3 D0713 05:18:07.036460 644063 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:07.043288 644063 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:07.043318 644063 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc00057acf0 4 D0713 05:18:07.043331 644063 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:07.044481 644063 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:07.044504 644063 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc00057acf0 5 D0713 05:18:07.044514 644063 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:07.044560 644063 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b214:sysno 13 D0713 05:18:07.044579 644063 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc00057acf0 6 D0713 05:18:07.044587 644063 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:07.044792 644063 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:07.044810 644063 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc00057acf0 7 D0713 05:18:07.044815 644063 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:07.045030 644063 usertrap_amd64.go:212] [ 1216: 1217] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:07.045054 644063 usertrap_amd64.go:122] [ 1216: 1217] Allocate a new trap: 0xc00057acf0 8 D0713 05:18:07.045065 644063 usertrap_amd64.go:225] [ 1216: 1217] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:07.045651 644063 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:07.045711 644063 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc00057acf0 9 D0713 05:18:07.045727 644063 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:07.045951 644063 usertrap_amd64.go:212] [ 1216: 1217] Found the pattern at ip 46af76:sysno 35 D0713 05:18:07.045980 644063 usertrap_amd64.go:122] [ 1216: 1217] Allocate a new trap: 0xc00057acf0 10 D0713 05:18:07.045990 644063 usertrap_amd64.go:225] [ 1216: 1217] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:07.054040 644063 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46af29:sysno 293 D0713 05:18:07.054097 644063 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc00057acf0 11 D0713 05:18:07.054115 644063 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:07.058741 644063 usertrap_amd64.go:212] [ 1216: 1217] Found the pattern at ip 46b020:sysno 39 D0713 05:18:07.058778 644063 usertrap_amd64.go:122] [ 1216: 1217] Allocate a new trap: 0xc00057acf0 12 D0713 05:18:07.058797 644063 usertrap_amd64.go:225] [ 1216: 1217] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:07.058884 644063 usertrap_amd64.go:212] [ 1216: 1217] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:07.058925 644063 usertrap_amd64.go:122] [ 1216: 1217] Allocate a new trap: 0xc00057acf0 13 D0713 05:18:07.058957 644063 usertrap_amd64.go:225] [ 1216: 1217] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:07.058998 644063 task_signals.go:470] [ 1216: 1216] Notified of signal 23 D0713 05:18:07.059132 644063 task_signals.go:220] [ 1216: 1216] Signal 23: delivering to handler D0713 05:18:07.065962 644063 task_signals.go:309] [ 1216: 1216] failed to restore from a signal frame: bad address D0713 05:18:07.066024 644063 task_signals.go:470] [ 1216: 1216] Notified of signal 11 D0713 05:18:07.066045 644063 task_signals.go:220] [ 1216: 1216] Signal 11: delivering to handler W0713 05:18:07.110836 644185 util.go:64] FATAL ERROR: waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-test-1": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-test-1": urpc method "containerManager.WaitPID" failed: EOF W0713 05:18:07.110979 644185 main.go:274] Failure to execute command, err: 1 W0713 05:18:07.124075 644038 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-test-1" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0713 05:18:07.124071 1 connection.go:127] sock read failed, closing connection: EOF I0713 05:18:07.124238 1 gofer.go:319] All lisafs servers exited. I0713 05:18:07.124271 1 main.go:265] Exiting with status: 0 D0713 05:18:07.140125 644038 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-test-1 D0713 05:18:07.140257 644038 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-test-1 D0713 05:18:07.140279 644038 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-test-1 D0713 05:18:07.140289 644038 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-test-1" D0713 05:18:07.140406 644038 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-test-1, PID: 644054 D0713 05:18:07.165383 644038 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-test-1" D0713 05:18:07.165466 644038 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-test-1" D0713 05:18:07.165552 644038 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-test-1" D0713 05:18:07.165562 644038 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-test-1" D0713 05:18:07.165569 644038 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-test-1" D0713 05:18:07.165577 644038 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-test-1" D0713 05:18:07.165584 644038 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-test-1" D0713 05:18:07.165590 644038 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-test-1" D0713 05:18:07.165598 644038 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-test-1" D0713 05:18:07.165605 644038 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-test-1" D0713 05:18:07.165619 644038 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-test-1" D0713 05:18:07.165625 644038 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-test-1" D0713 05:18:07.165632 644038 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-test-1" D0713 05:18:07.165639 644038 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-test-1" I0713 05:18:07.166105 644038 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0713 05:18:07.200187 644525 main.go:230] *************************** I0713 05:18:07.200246 644525 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-1] I0713 05:18:07.200267 644525 main.go:232] Version 0.0.0 I0713 05:18:07.200278 644525 main.go:233] GOOS: linux I0713 05:18:07.200290 644525 main.go:234] GOARCH: amd64 I0713 05:18:07.200301 644525 main.go:235] PID: 644525 I0713 05:18:07.200326 644525 main.go:236] UID: 0, GID: 0 I0713 05:18:07.200338 644525 main.go:237] Configuration: I0713 05:18:07.200355 644525 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0713 05:18:07.200373 644525 main.go:239] Platform: systrap I0713 05:18:07.200390 644525 main.go:240] FileAccess: shared I0713 05:18:07.200410 644525 main.go:241] Directfs: true I0713 05:18:07.200429 644525 main.go:242] Overlay: none I0713 05:18:07.200460 644525 main.go:243] Network: sandbox, logging: false I0713 05:18:07.200474 644525 main.go:244] Strace: false, max size: 1024, syscalls: I0713 05:18:07.200493 644525 main.go:245] IOURING: false I0713 05:18:07.200505 644525 main.go:246] Debug: true I0713 05:18:07.200523 644525 main.go:247] Systemd: false I0713 05:18:07.200535 644525 main.go:248] *************************** D0713 05:18:07.200579 644525 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 05:18:07.200683 644525 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-1": file does not exist loading container "ci-gvisor-systrap-1-test-1": file does not exist W0713 05:18:07.200747 644525 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-test-1"]: exit status 128 I0713 05:18:07.200187 644525 main.go:230] *************************** I0713 05:18:07.200246 644525 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-1] I0713 05:18:07.200267 644525 main.go:232] Version 0.0.0 I0713 05:18:07.200278 644525 main.go:233] GOOS: linux I0713 05:18:07.200290 644525 main.go:234] GOARCH: amd64 I0713 05:18:07.200301 644525 main.go:235] PID: 644525 I0713 05:18:07.200326 644525 main.go:236] UID: 0, GID: 0 I0713 05:18:07.200338 644525 main.go:237] Configuration: I0713 05:18:07.200355 644525 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0713 05:18:07.200373 644525 main.go:239] Platform: systrap I0713 05:18:07.200390 644525 main.go:240] FileAccess: shared I0713 05:18:07.200410 644525 main.go:241] Directfs: true I0713 05:18:07.200429 644525 main.go:242] Overlay: none I0713 05:18:07.200460 644525 main.go:243] Network: sandbox, logging: false I0713 05:18:07.200474 644525 main.go:244] Strace: false, max size: 1024, syscalls: I0713 05:18:07.200493 644525 main.go:245] IOURING: false I0713 05:18:07.200505 644525 main.go:246] Debug: true I0713 05:18:07.200523 644525 main.go:247] Systemd: false I0713 05:18:07.200535 644525 main.go:248] *************************** D0713 05:18:07.200579 644525 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 05:18:07.200683 644525 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-1": file does not exist loading container "ci-gvisor-systrap-1-test-1": file does not exist W0713 05:18:07.200747 644525 main.go:274] Failure to execute command, err: 1 [11548270.454118] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.496501] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.637682] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.680537] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.717881] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.175744] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.244740] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.289491] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.347827] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.386962] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.432610] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.452510] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.472049] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.493392] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.514001] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.534326] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.555439] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.575831] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.591661] warn_bad_vsyscall: 28 callbacks suppressed [11548299.591664] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.716645] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.218082] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.333278] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.369844] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.445978] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.012030] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.078579] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.134946] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.388423] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.442059] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.509579] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.182613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.228614] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.249852] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.270396] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.080494] warn_bad_vsyscall: 69 callbacks suppressed [11548311.080498] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.131994] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.183761] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.207733] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548326.195752] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.033861] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.883771] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.718811] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.764692] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.802193] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.003147] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.061042] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.083321] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.123123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.557059] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.614792] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.654451] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.900936] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.950630] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548350.007839] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.826680] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.880328] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.934074] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.272328] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.322197] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.361580] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.288522] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.327273] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.370594] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.489698] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.541048] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.609626] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.631505] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.250609] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.296008] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.297139] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.354078] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.375823] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.830961] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.909476] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.972469] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.174820] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.216089] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548391.283262] warn_bad_vsyscall: 1 callbacks suppressed [11548391.283264] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.329989] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.374640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548393.205978] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.255260] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.299080] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.344484] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.405320] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.464950] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.467363] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.255243] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.318628] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.319151] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.399578] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.401766] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.568699] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.919607] warn_bad_vsyscall: 3 callbacks suppressed [11548416.919610] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.966950] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.989006] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548417.034408] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.811451] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.860253] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.886942] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.928112] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.778887] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.820893] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.842334] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880084] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880903] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.508111] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.601445] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.602653] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.704447] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.705345] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.826999] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872284] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872375] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.986065] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.258456] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.300258] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.349378] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548474.517614] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.564789] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.587128] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.638151] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548480.604311] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.644087] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.687806] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.689290] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548484.123787] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.180672] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.239780] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548493.278360] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328236] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328600] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.390304] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.833382] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.961149] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548509.063948] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548520.613294] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.659518] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.708570] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548526.299866] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.339536] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.402244] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.425302] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.894709] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.938050] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.982622] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.450297] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.505520] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.528534] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.568597] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548544.956800] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.013667] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.033643] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.085490] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548549.234345] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.282824] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.329949] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.534109] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.597324] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.621011] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.681465] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.886217] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.950142] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.998720] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.869926] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.934033] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.955035] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.014796] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.296125] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.353392] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.399746] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548570.911499] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.669130] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.735195] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.776546] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.660338] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.699761] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.746611] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.932572] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.972071] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.994399] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548597.034578] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.022991] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.090767] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.091012] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177700] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177834] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.557153] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.606340] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.653245] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.686798] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.776155] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.819898] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.872777] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.809818] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.860562] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.902531] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.707415] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.760809] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.817281] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.837170] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.856971] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.880580] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.901934] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.921867] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.942728] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.963710] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.234572] warn_bad_vsyscall: 60 callbacks suppressed [11548659.234577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.319640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.375122] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.395917] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.877517] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.920825] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.942925] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.984794] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548666.639541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.680685] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.721252] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548685.149430] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.193561] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.234314] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.259938] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.046303] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.090192] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.111864] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.155942] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.597615] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.643566] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.512636] warn_bad_vsyscall: 2 callbacks suppressed [11548693.512640] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.587898] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.622954] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.672410] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.860094] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.898007] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.935962] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.083950] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.139793] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.183343] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.433839] warn_bad_vsyscall: 4 callbacks suppressed [11548701.433843] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.486929] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.525603] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.154317] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.196722] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.240576] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.261222] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.863192] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.911865] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.965656] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.905248] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.941691] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.983975] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.279943] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.327248] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.389725] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.413266] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.107500] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.162576] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.212182] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.593451] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.640310] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.696914] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.087707] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.134560] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.378944] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.423937] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.443330] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.463024] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.482763] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.505914] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.525847] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.546368] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.567195] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.587657] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.371230] warn_bad_vsyscall: 29 callbacks suppressed [11548765.371234] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.416207] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.456858] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.014315] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.053783] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.097156] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548783.841479] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.890700] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.932657] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.698534] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.744861] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.765479] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.802565] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.823701] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548816.611166] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.660003] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.708264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.616862] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.656506] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.686639] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.730645] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.103497] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.175520] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.217584] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.239654] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.380393] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419346] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419914] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.482312] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.504801] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.673651] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548838.107208] warn_bad_vsyscall: 69 callbacks suppressed [11548838.107211] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.166865] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.212798] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.234075] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.515015] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573192] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573250] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.637396] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.856419] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.903599] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.043501] warn_bad_vsyscall: 3 callbacks suppressed [11548851.043505] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.091113] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.134490] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.651270] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.696335] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.749606] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.916650] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.958708] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548852.000342] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.093160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.147244] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.168810] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.275323] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.795133] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.856035] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.904442] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.933821] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.146784] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.215461] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.263431] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.250299] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.301702] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.322428] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.363670] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.387918] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.562614] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.605694] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.627575] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.667298] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.692069] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.739223] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.784533] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.785479] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.861757] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548914.066544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548920.546376] warn_bad_vsyscall: 3 callbacks suppressed [11548920.546380] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.598743] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.656217] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.789652] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.873526] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.930080] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.662584] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.704522] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.747412] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548941.905328] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.002937] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.026135] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.047304] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.070126] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.093651] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.118417] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.138954] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.161818] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.197908] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548947.008863] warn_bad_vsyscall: 29 callbacks suppressed [11548947.008867] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.117286] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.212764] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.279648] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.345439] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.439123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.226947] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.265920] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.306266] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.023857] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.083854] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.084666] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.162482] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.182136] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.202273] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.225957] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.248936] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.269819] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.291316] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.814852] warn_bad_vsyscall: 61 callbacks suppressed [11548984.814855] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.924203] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548999.981207] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.031437] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.075008] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.490779] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.548739] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.596976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.622828] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549003.408072] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.450273] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.493544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549011.127750] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.168732] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.204428] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.584759] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.637945] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.661027] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.703124] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.880815] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.931172] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.980221] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.112241] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.159181] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.184471] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.234060] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.289213] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.338880] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.384608] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.697534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.734874] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.790174] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.722197] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.769295] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.813981] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.670371] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.708511] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.749962] exe[743908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.269200] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.317692] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.341079] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.380507] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.807867] warn_bad_vsyscall: 1 callbacks suppressed [11549067.807871] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.870608] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.908220] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.669345] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.711360] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.754534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.604356] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.659869] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.706198] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549089.981820] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.040241] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.062834] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.120102] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549094.367870] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.417816] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.462962] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602597.777330] audit: type=1326 audit(1689206344.991:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602603.869164] audit: type=1326 audit(1689206351.083:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754999 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.285215] audit: type=1326 audit(1689206425.499:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=755000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.677713] audit: type=1326 audit(1689206425.891:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602696.843980] audit: type=1326 audit(1689206444.055:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=753602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602743.097537] audit: type=1326 audit(1689206490.311:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602743.122326] audit: type=1326 audit(1689206490.311:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602759.499374] audit: type=1326 audit(1689206506.710:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602854.344933] audit: type=1326 audit(1689206601.558:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602859.040813] audit: type=1326 audit(1689206606.254:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765875 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602884.867590] audit: type=1326 audit(1689206632.078:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=767807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602895.802192] audit: type=1326 audit(1689206643.014:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=750390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602921.417882] audit: type=1326 audit(1689206668.630:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602934.284216] audit: type=1326 audit(1689206681.494:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=763696 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602998.074154] audit: type=1326 audit(1689206745.286:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=771543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603001.490232] audit: type=1326 audit(1689206748.702:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772848 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603019.886473] exe[728911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603019.961263] exe[723449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.012456] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.033883] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.390766] audit: type=1326 audit(1689206767.602:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603082.847524] audit: type=1326 audit(1689206830.058:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=775665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603138.090907] audit: type=1326 audit(1689206885.302:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603172.298141] audit: type=1326 audit(1689206919.510:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777217 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603182.461434] audit: type=1326 audit(1689206929.674:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780255 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603243.896847] audit: type=1326 audit(1689206991.106:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603279.127507] audit: type=1326 audit(1689207026.338:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=787634 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603309.589653] audit: type=1326 audit(1689207056.802:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603335.471219] audit: type=1326 audit(1689207082.682:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=788938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603343.797267] audit: type=1326 audit(1689207091.010:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=790140 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603405.836680] audit: type=1326 audit(1689207153.046:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792319 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603420.441739] audit: type=1326 audit(1689207167.654:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603427.753376] audit: type=1326 audit(1689207174.966:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774364 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603505.176389] audit: type=1326 audit(1689207252.385:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796183 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603533.829677] audit: type=1326 audit(1689207281.041:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=797063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603562.278422] audit: type=1326 audit(1689207309.489:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603667.052521] audit: type=1326 audit(1689207414.261:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=805774 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603667.905373] audit: type=1326 audit(1689207415.113:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=807621 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603676.505802] audit: type=1326 audit(1689207423.717:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=806198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603684.820900] audit: type=1326 audit(1689207432.029:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=793728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603795.965747] audit: type=1326 audit(1689207543.177:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=812556 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603804.637990] audit: type=1326 audit(1689207551.849:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603810.551130] audit: type=1326 audit(1689207557.761:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810358 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603820.309874] audit: type=1326 audit(1689207567.521:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=811185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603836.504336] audit: type=1326 audit(1689207583.713:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=800972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603841.793876] audit: type=1326 audit(1689207589.005:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603870.199020] audit: type=1326 audit(1689207617.409:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603951.796356] audit: type=1326 audit(1689207699.005:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=816857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603957.195581] audit: type=1326 audit(1689207704.405:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817252 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603991.129069] audit: type=1326 audit(1689207738.337:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=819555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604091.585729] audit: type=1326 audit(1689207838.793:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604093.722432] audit: type=1326 audit(1689207840.933:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604119.143756] audit: type=1326 audit(1689207866.353:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=822836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604204.469045] audit: type=1326 audit(1689207951.676:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604217.655924] audit: type=1326 audit(1689207964.864:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=818547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604224.651590] audit: type=1326 audit(1689207971.860:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604234.352201] audit: type=1326 audit(1689207981.564:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604235.997704] audit: type=1326 audit(1689207983.208:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604256.614441] audit: type=1326 audit(1689208003.828:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604263.313503] audit: type=1326 audit(1689208010.524:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=828626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604308.646673] audit: type=1326 audit(1689208055.860:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831393 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604427.403379] audit: type=1326 audit(1689208174.616:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=833669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604450.026228] audit: type=1326 audit(1689208197.240:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=834371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604459.830108] audit: type=1326 audit(1689208207.040:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604476.678391] audit: type=1326 audit(1689208223.892:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829944 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604506.595388] audit: type=1326 audit(1689208253.808:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=836737 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604536.910472] audit: type=1326 audit(1689208284.124:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824480 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604588.801578] audit: type=1326 audit(1689208336.012:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604590.878115] audit: type=1326 audit(1689208338.088:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604613.330191] audit: type=1326 audit(1689208360.540:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=849945 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604648.014559] audit: type=1326 audit(1689208395.228:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=844081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604655.910760] audit: type=1326 audit(1689208403.124:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604731.191216] audit: type=1326 audit(1689208478.404:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=841978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604750.453981] audit: type=1326 audit(1689208497.664:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850369 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604790.297089] audit: type=1326 audit(1689208537.508:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=851838 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604911.917454] audit: type=1326 audit(1689208659.128:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=855574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604932.248331] audit: type=1326 audit(1689208679.459:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=856349 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604979.039220] audit: type=1326 audit(1689208726.251:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=854027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605001.217428] audit: type=1326 audit(1689208748.427:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605004.825105] audit: type=1326 audit(1689208752.035:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605073.388168] audit: type=1326 audit(1689208820.599:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605073.905125] audit: type=1326 audit(1689208821.115:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861403 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605096.082181] audit: type=1326 audit(1689208843.291:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605129.878423] audit: type=1326 audit(1689208877.087:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=866278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605177.031421] audit: type=1326 audit(1689208924.243:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865008 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605235.963087] exe[867632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bc192d40a cs:33 sp:7f06f0682ee8 ax:12 si:ffffffffff600000 di:559bc1999ff2 [11605242.250840] audit: type=1326 audit(1689208989.459:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605259.396277] exe[729169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.444946] exe[734784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.493436] exe[735065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605345.057961] audit: type=1326 audit(1689209092.267:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=867457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605366.290442] audit: type=1326 audit(1689209113.499:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=872748 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605379.568477] audit: type=1326 audit(1689209126.779:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=868919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605400.381802] audit: type=1326 audit(1689209147.591:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873868 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605499.168636] audit: type=1326 audit(1689209246.379:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873036 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605641.112938] audit: type=1326 audit(1689209388.322:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=878736 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605650.594619] audit: type=1326 audit(1689209397.802:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879055 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605769.011148] audit: type=1326 audit(1689209516.218:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897739 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605783.192934] audit: type=1326 audit(1689209530.402:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=888577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605785.006125] audit: type=1326 audit(1689209532.214:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=874679 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605792.566409] audit: type=1326 audit(1689209539.774:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=899333 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605803.584285] audit: type=1326 audit(1689209550.794:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=889127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605917.107175] audit: type=1326 audit(1689209664.314:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=900168 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605999.175587] audit: type=1326 audit(1689209746.386:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=903724 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606057.989861] audit: type=1326 audit(1689209805.198:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=908771 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606081.023977] audit: type=1326 audit(1689209828.234:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901681 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606081.049199] audit: type=1326 audit(1689209828.234:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606140.480349] audit: type=1326 audit(1689209887.690:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606161.551475] audit: type=1326 audit(1689209908.758:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606199.187532] audit: type=1326 audit(1689209946.394:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=916010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606218.913397] audit: type=1326 audit(1689209966.122:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922661 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606232.077547] audit: type=1326 audit(1689209979.282:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=923826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606380.343966] audit: type=1326 audit(1689210127.553:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606411.655428] audit: type=1326 audit(1689210158.861:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927181 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606523.891076] audit: type=1326 audit(1689210271.097:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606544.833841] audit: type=1326 audit(1689210292.041:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932874 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606553.082384] audit: type=1326 audit(1689210300.289:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=934463 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606576.113741] audit: type=1326 audit(1689210323.321:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=939578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606603.669625] audit: type=1326 audit(1689210350.877:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918032 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606666.104511] audit: type=1326 audit(1689210413.313:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=938428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606700.273078] audit: type=1326 audit(1689210447.481:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606722.409710] audit: type=1326 audit(1689210469.617:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=944587 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606723.591484] audit: type=1326 audit(1689210470.797:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918004 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606726.625428] audit: type=1326 audit(1689210473.833:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=925543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606749.842751] audit: type=1326 audit(1689210497.049:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=945425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606774.216268] audit: type=1326 audit(1689210521.421:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606775.272993] audit: type=1326 audit(1689210522.481:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946844 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606808.022043] audit: type=1326 audit(1689210555.229:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=942712 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606825.235825] audit: type=1326 audit(1689210572.441:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=943616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606903.854733] audit: type=1326 audit(1689210651.061:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=951196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606950.408866] audit: type=1326 audit(1689210697.617:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607046.030686] audit: type=1326 audit(1689210793.237:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=955433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607082.153088] audit: type=1326 audit(1689210829.361:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=963715 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607091.177801] audit: type=1326 audit(1689210838.384:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607204.949220] audit: type=1326 audit(1689210952.160:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961511 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607214.149455] audit: type=1326 audit(1689210961.360:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607234.203101] audit: type=1326 audit(1689210981.412:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=965279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607246.591122] audit: type=1326 audit(1689210993.800:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607346.908337] audit: type=1326 audit(1689211094.116:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607347.810535] audit: type=1326 audit(1689211095.020:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=976275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607373.022204] audit: type=1326 audit(1689211120.232:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607377.243731] audit: type=1326 audit(1689211124.452:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969402 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607487.048913] audit: type=1326 audit(1689211234.256:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946299 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607489.734138] audit: type=1326 audit(1689211236.944:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977298 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607499.561410] audit: type=1326 audit(1689211246.772:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607519.191537] audit: type=1326 audit(1689211266.400:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607624.457049] audit: type=1326 audit(1689211371.664:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=985128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607631.705291] audit: type=1326 audit(1689211378.916:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=983126 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607638.204050] audit: type=1326 audit(1689211385.412:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979517 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607751.083724] audit: type=1326 audit(1689211498.292:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=989206 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607766.193883] audit: type=1326 audit(1689211513.404:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988722 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607770.820805] audit: type=1326 audit(1689211518.028:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=972203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607889.548013] audit: type=1326 audit(1689211636.755:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=995356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607890.272191] audit: type=1326 audit(1689211637.479:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984084 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607892.217788] audit: type=1326 audit(1689211639.427:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=994449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607973.414133] audit: type=1326 audit(1689211720.623:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607997.840992] audit: type=1326 audit(1689211745.047:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608009.823096] exe[880088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.862814] exe[908958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.905875] exe[880060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7a7858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608031.274871] audit: type=1326 audit(1689211778.483:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998191 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608034.038701] audit: type=1326 audit(1689211781.247:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998422 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608075.873755] audit: type=1326 audit(1689211823.083:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992937 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608174.269361] audit: type=1326 audit(1689211921.475:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608175.997697] audit: type=1326 audit(1689211923.203:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608317.934996] audit: type=1326 audit(1689212065.143:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16671 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608318.010584] audit: type=1326 audit(1689212065.219:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16326 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608345.573784] audit: type=1326 audit(1689212092.779:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11133 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608451.296340] audit: type=1326 audit(1689212198.503:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29829 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608460.035472] audit: type=1326 audit(1689212207.243:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608462.176738] audit: type=1326 audit(1689212209.383:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25141 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608503.267767] audit: type=1326 audit(1689212250.475:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=34498 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608533.390892] audit: type=1326 audit(1689212280.598:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999989 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608586.343765] audit: type=1326 audit(1689212333.550:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11132 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608603.172815] audit: type=1326 audit(1689212350.378:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608604.375648] audit: type=1326 audit(1689212351.582:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608625.227797] audit: type=1326 audit(1689212372.434:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608653.653041] audit: type=1326 audit(1689212400.858:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996310 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608746.810007] audit: type=1326 audit(1689212494.014:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608759.068622] audit: type=1326 audit(1689212506.274:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608844.060417] audit: type=1326 audit(1689212591.266:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47509 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608849.979155] audit: type=1326 audit(1689212597.186:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26927 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608866.192620] audit: type=1326 audit(1689212613.398:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50432 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608900.419588] audit: type=1326 audit(1689212647.626:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=48313 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609041.941064] audit: type=1326 audit(1689212789.146:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609043.267962] audit: type=1326 audit(1689212790.474:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=51808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609101.039399] exe[19846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.200826] exe[42029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.233088] exe[21925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.359654] exe[14202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609114.859756] audit: type=1326 audit(1689212862.066:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=53392 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609136.468568] audit: type=1326 audit(1689212883.674:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=63106 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609184.539557] audit: type=1326 audit(1689212931.746:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55835 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609224.389789] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.508861] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.664605] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.692561] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.721718] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.758715] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.820055] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.852642] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.874621] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.926286] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609296.412170] audit: type=1326 audit(1689213043.617:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=38807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609346.942415] audit: type=1326 audit(1689213094.145:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=67199 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609386.199827] audit: type=1326 audit(1689213133.405:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=70379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609407.497500] audit: type=1326 audit(1689213154.701:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=80674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609489.512442] audit: type=1326 audit(1689213236.717:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=78397 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609536.734812] audit: type=1326 audit(1689213283.937:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=44670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609540.467947] audit: type=1326 audit(1689213287.673:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609578.029249] audit: type=1326 audit(1689213325.233:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609580.700973] audit: type=1326 audit(1689213327.905:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609630.673391] audit: type=1326 audit(1689213377.877:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609672.894466] audit: type=1326 audit(1689213420.097:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609673.764769] audit: type=1326 audit(1689213420.969:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56076 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609682.185992] audit: type=1326 audit(1689213429.389:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=93458 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609689.245620] audit: type=1326 audit(1689213436.449:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=39787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609704.620136] audit: type=1326 audit(1689213451.825:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103151 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609718.303851] audit: type=1326 audit(1689213465.509:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609732.024113] audit: type=1326 audit(1689213479.229:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609746.654594] audit: type=1326 audit(1689213493.857:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=99508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609891.802556] audit: type=1326 audit(1689213639.005:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=107746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609980.959613] audit: type=1326 audit(1689213728.164:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=111400 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610037.921958] warn_bad_vsyscall: 57 callbacks suppressed [11610037.921961] exe[104886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cf1f3e40a cs:33 sp:7f9740193ee8 ax:12 si:ffffffffff600000 di:557cf1faaff2 [11610091.078793] audit: type=1326 audit(1689213838.284:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=114972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610124.942162] audit: type=1326 audit(1689213872.148:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610177.285395] audit: type=1326 audit(1689213924.492:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102441 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610193.441605] audit: type=1326 audit(1689213940.648:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610225.810101] audit: type=1326 audit(1689213973.016:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123167 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610233.553409] audit: type=1326 audit(1689213980.760:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=121916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610256.024194] audit: type=1326 audit(1689214003.232:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128638 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610300.269297] audit: type=1326 audit(1689214047.476:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610367.800104] audit: type=1326 audit(1689214115.008:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128262 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610392.269170] audit: type=1326 audit(1689214139.476:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=129506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610463.704357] audit: type=1326 audit(1689214210.912:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610509.525530] audit: type=1326 audit(1689214256.732:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=133363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610534.233051] audit: type=1326 audit(1689214281.440:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=134147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610535.552490] audit: type=1326 audit(1689214282.760:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102360 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610558.818901] audit: type=1326 audit(1689214306.024:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138968 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610563.001154] audit: type=1326 audit(1689214310.208:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125930 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610652.067752] audit: type=1326 audit(1689214399.272:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610675.976391] audit: type=1326 audit(1689214423.180:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138768 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610794.201252] audit: type=1326 audit(1689214541.407:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146110 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610817.416788] audit: type=1326 audit(1689214564.623:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=147787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610824.164743] audit: type=1326 audit(1689214571.371:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610917.045624] audit: type=1326 audit(1689214664.247:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=155879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610935.100843] audit: type=1326 audit(1689214682.307:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=154665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610957.386648] audit: type=1326 audit(1689214704.591:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=160285 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611044.973755] audit: type=1326 audit(1689214792.179:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104427 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611052.355082] exe[161359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.396817] exe[161402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.417215] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.458817] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9dd858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611057.686547] audit: type=1326 audit(1689214804.891:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159476 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611080.561894] audit: type=1326 audit(1689214827.767:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611091.751769] audit: type=1326 audit(1689214838.955:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=163210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611106.510657] audit: type=1326 audit(1689214853.715:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164175 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611206.621679] audit: type=1326 audit(1689214953.827:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162899 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611226.105804] audit: type=1326 audit(1689214973.311:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=157532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611328.860902] audit: type=1326 audit(1689215076.067:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=136219 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611349.685728] audit: type=1326 audit(1689215096.891:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166089 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611355.989960] audit: type=1326 audit(1689215103.195:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611470.897001] exe[173131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611470.982692] exe[172685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611471.068495] exe[172788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611491.624312] audit: type=1326 audit(1689215238.826:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611498.281194] audit: type=1326 audit(1689215245.486:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171656 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611545.887586] audit: type=1326 audit(1689215293.090:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611556.965422] audit: type=1326 audit(1689215304.170:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611636.098091] audit: type=1326 audit(1689215383.302:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611641.171130] audit: type=1326 audit(1689215388.374:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176464 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611712.598686] audit: type=1326 audit(1689215459.802:770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611779.405216] audit: type=1326 audit(1689215526.606:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=183629 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611784.275845] audit: type=1326 audit(1689215531.478:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611807.175705] audit: type=1326 audit(1689215554.378:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=139924 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611845.278909] exe[175719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.131823] exe[175495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.132343] exe[62220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.255247] exe[192224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611865.951902] exe[193267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96258cee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.843870] exe[194427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.849440] exe[193278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.684536] exe[193231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.685047] exe[193276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611923.773068] audit: type=1326 audit(1689215670.974:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611927.131634] audit: type=1326 audit(1689215674.334:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192265 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611946.855512] audit: type=1326 audit(1689215694.058:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612069.445142] audit: type=1326 audit(1689215816.646:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199539 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612092.184084] audit: type=1326 audit(1689215839.386:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205940 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612109.628298] audit: type=1326 audit(1689215856.830:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=167586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612169.655524] audit: type=1326 audit(1689215916.857:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=179867 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612196.158283] audit: type=1326 audit(1689215943.361:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612321.757529] audit: type=1326 audit(1689216068.961:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612338.198911] audit: type=1326 audit(1689216085.401:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210033 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612341.930437] audit: type=1326 audit(1689216089.133:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612480.723412] audit: type=1326 audit(1689216227.925:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612484.182272] audit: type=1326 audit(1689216231.385:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215515 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612623.704171] audit: type=1326 audit(1689216370.905:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612627.491761] audit: type=1326 audit(1689216374.693:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219947 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612650.811661] audit: type=1326 audit(1689216398.017:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612725.881937] audit: type=1326 audit(1689216473.081:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215502 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612768.073479] audit: type=1326 audit(1689216515.273:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612911.907957] exe[230755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784c9cc40a cs:33 sp:7f8d98f46ee8 ax:12 si:ffffffffff600000 di:55784ca38ff2 [11612912.026179] audit: type=1326 audit(1689216659.232:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=229411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612928.029305] audit: type=1326 audit(1689216675.232:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612933.884371] audit: type=1326 audit(1689216681.088:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=237418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613007.977947] audit: type=1326 audit(1689216755.180:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242949 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613034.707467] exe[210137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed66be340a cs:33 sp:7fd40805cee8 ax:12 si:ffffffffff600000 di:55ed66c4fff2 [11613067.683364] audit: type=1326 audit(1689216814.888:796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=238399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613090.757129] audit: type=1326 audit(1689216837.960:797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613156.842452] audit: type=1326 audit(1689216904.048:798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162031 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613176.892347] audit: type=1326 audit(1689216924.096:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613225.327240] audit: type=1326 audit(1689216972.532:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613257.820594] audit: type=1326 audit(1689217005.024:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248201 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613259.764460] exe[113089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.896766] exe[129485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.994509] exe[113108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613260.035649] exe[167068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613367.064209] audit: type=1326 audit(1689217114.268:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=257164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613389.920266] audit: type=1326 audit(1689217137.124:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=265247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613400.171681] audit: type=1326 audit(1689217147.376:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=261413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613423.461311] audit: type=1326 audit(1689217170.664:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=267746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613556.820936] audit: type=1326 audit(1689217304.024:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=269567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613639.322076] audit: type=1326 audit(1689217386.523:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=271970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613662.359245] audit: type=1326 audit(1689217409.563:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=279508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613699.545408] audit: type=1326 audit(1689217446.747:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=274933 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613729.742873] audit: type=1326 audit(1689217476.947:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=227591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11613758.457839] audit: type=1326 audit(1689217505.659:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=208877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613841.828755] audit: type=1326 audit(1689217589.031:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613865.039411] audit: type=1326 audit(1689217612.243:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=285941 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613909.215817] exe[280649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613909.285023] exe[281621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613910.102687] exe[280647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613911.927175] audit: type=1326 audit(1689217659.131:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=283958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613926.880021] audit: type=1326 audit(1689217674.083:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=250982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613951.214334] audit: type=1326 audit(1689217698.415:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613994.384142] audit: type=1326 audit(1689217741.587:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=289847 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614054.357636] audit: type=1326 audit(1689217801.559:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614197.565657] audit: type=1326 audit(1689217944.767:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293965 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614243.930801] audit: type=1326 audit(1689217991.131:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295865 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614340.962187] audit: type=1326 audit(1689218088.162:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614378.700022] audit: type=1326 audit(1689218125.902:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302653 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614436.168021] audit: type=1326 audit(1689218183.370:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=306526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614488.028688] audit: type=1326 audit(1689218235.230:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614531.437813] audit: type=1326 audit(1689218278.638:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=313198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614546.864834] audit: type=1326 audit(1689218294.066:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319188 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614567.377282] audit: type=1326 audit(1689218314.578:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=299618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614623.636542] audit: type=1326 audit(1689218370.838:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614629.720322] audit: type=1326 audit(1689218376.922:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614697.032081] audit: type=1326 audit(1689218444.234:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614708.565361] audit: type=1326 audit(1689218455.766:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=321370 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614725.059201] audit: type=1326 audit(1689218472.258:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614725.083797] audit: type=1326 audit(1689218472.270:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614763.316197] audit: type=1326 audit(1689218510.518:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614783.657848] audit: type=1326 audit(1689218530.858:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.377379] audit: type=1326 audit(1689218572.578:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.954441] audit: type=1326 audit(1689218573.154:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614826.473984] audit: type=1326 audit(1689218573.674:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614849.192210] audit: type=1326 audit(1689218596.394:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347434 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614869.432839] audit: type=1326 audit(1689218616.634:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614904.547842] audit: type=1326 audit(1689218651.746:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614919.904813] audit: type=1326 audit(1689218667.106:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344659 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614989.331061] audit: type=1326 audit(1689218736.530:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615026.778194] audit: type=1326 audit(1689218773.978:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615046.792010] audit: type=1326 audit(1689218793.989:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=353766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615075.957721] audit: type=1326 audit(1689218823.157:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=355648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615092.070251] audit: type=1326 audit(1689218839.269:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615105.006673] audit: type=1326 audit(1689218852.205:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615115.088959] audit: type=1326 audit(1689218862.289:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=374087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615140.436699] audit: type=1326 audit(1689218887.637:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=379563 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615189.321653] audit: type=1326 audit(1689218936.521:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=369018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615249.883397] audit: type=1326 audit(1689218997.081:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=377300 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615278.181181] audit: type=1326 audit(1689219025.381:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=365614 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615285.687507] audit: type=1326 audit(1689219032.885:854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383294 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615334.361923] audit: type=1326 audit(1689219081.561:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=386918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615358.021042] audit: type=1326 audit(1689219105.221:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=397046 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615372.830891] audit: type=1326 audit(1689219120.029:857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615392.629913] audit: type=1326 audit(1689219139.829:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=391869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615418.819110] audit: type=1326 audit(1689219166.017:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615534.998711] audit: type=1326 audit(1689219282.197:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615536.639688] audit: type=1326 audit(1689219283.837:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.252941] audit: type=1326 audit(1689219319.453:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.566380] audit: type=1326 audit(1689219319.765:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=402658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615607.239874] audit: type=1326 audit(1689219354.437:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=404197 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615682.174935] audit: type=1326 audit(1689219429.373:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=395486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615749.676438] audit: type=1326 audit(1689219496.873:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=409554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615772.856758] audit: type=1326 audit(1689219520.056:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=415966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615782.603424] audit: type=1326 audit(1689219529.800:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=393960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615837.996675] audit: type=1326 audit(1689219585.196:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414088 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.905148] audit: type=1326 audit(1689219603.108:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.959406] audit: type=1326 audit(1689219603.160:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414743 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615907.170690] audit: type=1326 audit(1689219654.372:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616016.968741] audit: type=1326 audit(1689219764.168:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419234 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616018.174727] audit: type=1326 audit(1689219765.376:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419205 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616049.790873] audit: type=1326 audit(1689219796.992:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420016 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616179.467941] audit: type=1326 audit(1689219926.668:876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616180.555813] audit: type=1326 audit(1689219927.756:877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616192.430465] audit: type=1326 audit(1689219939.632:878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616204.730256] audit: type=1326 audit(1689219951.932:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426323 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616215.467880] audit: type=1326 audit(1689219962.668:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426686 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616342.057416] audit: type=1326 audit(1689220089.260:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616344.197343] audit: type=1326 audit(1689220091.400:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427038 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616349.922513] audit: type=1326 audit(1689220097.124:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616463.003124] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117536ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.155216] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec1174f4ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.334664] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.365978] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.395492] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.434812] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.469559] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.499013] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.528098] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.559286] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.856088] audit: type=1326 audit(1689220211.056:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433896 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616468.036730] warn_bad_vsyscall: 56 callbacks suppressed [11616468.036733] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.143022] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.346868] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.476775] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.602391] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.747206] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.905526] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.069465] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.228264] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.373763] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616478.212932] audit: type=1326 audit(1689220225.412:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=399179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616486.892502] audit: type=1326 audit(1689220234.092:886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616504.636883] audit: type=1326 audit(1689220251.835:887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434647 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616506.387296] audit: type=1326 audit(1689220253.587:888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616618.325394] audit: type=1326 audit(1689220365.523:889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616624.272672] audit: type=1326 audit(1689220371.471:890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616641.156448] audit: type=1326 audit(1689220388.355:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616646.887273] audit: type=1326 audit(1689220394.087:892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416646 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616669.130945] audit: type=1326 audit(1689220416.331:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616671.357319] audit: type=1326 audit(1689220418.555:894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616685.822247] audit: type=1326 audit(1689220433.023:895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426318 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616727.733883] warn_bad_vsyscall: 14 callbacks suppressed [11616727.733887] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.854758] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.896011] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.024074] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.060517] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.174456] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.285948] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.286187] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.433658] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.542871] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.745666] warn_bad_vsyscall: 149 callbacks suppressed [11616732.745670] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.778992] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.807892] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.837387] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.866886] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.895047] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.005828] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.156311] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.302872] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.344866] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.937508] warn_bad_vsyscall: 156 callbacks suppressed [11616737.937511] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.978420] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.107496] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.221153] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.332316] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.371403] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.516981] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.646772] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.793750] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.925501] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616742.938460] warn_bad_vsyscall: 95 callbacks suppressed [11616742.938463] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.139113] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.249995] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.287426] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.799359] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.961896] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.123243] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.277308] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.579977] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.680400] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.059194] warn_bad_vsyscall: 179 callbacks suppressed [11616748.059198] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.099340] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.218641] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.353244] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.514493] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.675188] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.816625] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616748.957631] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.061746] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.178713] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.071882] warn_bad_vsyscall: 129 callbacks suppressed [11616753.071903] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.188917] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.305604] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.308145] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.434246] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.463792] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.573550] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.690786] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.948656] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616754.057794] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.088841] warn_bad_vsyscall: 69 callbacks suppressed [11616758.088845] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.198407] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.325846] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.452371] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.611864] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.848362] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.023674] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.223697] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.378129] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.414350] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.247975] warn_bad_vsyscall: 67 callbacks suppressed [11616763.247978] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.379531] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.506568] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.576974] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.712296] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.868809] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.012072] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.044986] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.075153] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.105612] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.632673] warn_bad_vsyscall: 72 callbacks suppressed [11616768.632677] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.764563] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.797201] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.945297] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.977094] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.105815] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.219603] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.319274] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.446879] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.586043] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.407661] warn_bad_vsyscall: 20 callbacks suppressed [11616774.407665] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.443917] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.480792] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.515412] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.549287] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.577325] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.615687] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.650789] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.680564] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.712742] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.732922] warn_bad_vsyscall: 59 callbacks suppressed [11616779.732927] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.873482] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.015511] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.144019] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.148245] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.292227] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.408584] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.554021] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.587092] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.707671] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616831.354738] audit: type=1326 audit(1689220578.555:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616849.536866] audit: type=1326 audit(1689220596.735:897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616891.400048] audit: type=1326 audit(1689220638.599:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616955.867342] audit: type=1326 audit(1689220703.067:899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616993.610115] audit: type=1326 audit(1689220740.811:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448725 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617027.425260] warn_bad_vsyscall: 1 callbacks suppressed [11617027.425263] exe[423335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559734aa5839 cs:33 sp:7f1166de5ee8 ax:0 si:20000240 di:ffffffffff600000 [11617031.423364] audit: type=1326 audit(1689220778.623:901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617034.068901] audit: type=1326 audit(1689220781.267:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=450336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617036.395177] exe[403877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2071a9839 cs:33 sp:7f1205849ee8 ax:0 si:20000240 di:ffffffffff600000 [11617110.112230] exe[450940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563710d72839 cs:33 sp:7fb6768c9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617120.897024] audit: type=1326 audit(1689220868.095:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=452760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617155.771686] audit: type=1326 audit(1689220902.971:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617163.858912] audit: type=1326 audit(1689220911.059:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=456904 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617173.909893] audit: type=1326 audit(1689220921.107:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=359483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617177.166434] audit: type=1326 audit(1689220924.363:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453803 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617199.530594] audit: type=1326 audit(1689220946.731:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458135 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617242.071168] exe[456653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d54535f839 cs:33 sp:7fddbdecbee8 ax:0 si:20000240 di:ffffffffff600000 [11617242.806185] exe[452415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7ccdb9839 cs:33 sp:7f37b6bf9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617285.999616] exe[453136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55772e5b8839 cs:33 sp:7ea5ab3feee8 ax:0 si:20000240 di:ffffffffff600000 [11617310.725595] exe[352485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564403af1839 cs:33 sp:7fe27b9feee8 ax:0 si:20000240 di:ffffffffff600000 [11617320.633665] audit: type=1326 audit(1689221067.830:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617333.963647] audit: type=1326 audit(1689221081.162:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617344.534053] exe[456677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6142f839 cs:33 sp:7fcfb7eebee8 ax:0 si:20000240 di:ffffffffff600000 [11617407.485335] audit: type=1326 audit(1689221154.682:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617407.510562] audit: type=1326 audit(1689221154.682:912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617450.603853] audit: type=1326 audit(1689221197.802:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444772 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617458.156564] exe[464010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55932fcf1839 cs:33 sp:7fadc19c2ee8 ax:0 si:20000240 di:ffffffffff600000 [11617470.363479] exe[373491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56224fbf2839 cs:33 sp:7f9f309ccee8 ax:0 si:20000240 di:ffffffffff600000 [11617473.971610] audit: type=1326 audit(1689221221.170:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617475.605465] exe[461182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796b1a858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.707828] exe[462051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.818558] exe[462052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617485.057212] audit: type=1326 audit(1689221232.254:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617570.056481] audit: type=1326 audit(1689221317.254:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=465697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617597.277555] audit: type=1326 audit(1689221344.474:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617616.134916] exe[368535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b36f85f839 cs:33 sp:7ecb96446ee8 ax:0 si:20000240 di:ffffffffff600000 [11617648.439900] audit: type=1326 audit(1689221395.638:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=467841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617678.970527] audit: type=1326 audit(1689221426.166:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=457982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617700.643689] audit: type=1326 audit(1689221447.842:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617732.017925] audit: type=1326 audit(1689221479.214:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469314 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617738.589958] audit: type=1326 audit(1689221485.786:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466971 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617740.351068] audit: type=1326 audit(1689221487.550:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617792.775079] exe[470535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93a6ea839 cs:33 sp:7ea8e19feee8 ax:0 si:20000240 di:ffffffffff600000 [11617809.463896] audit: type=1326 audit(1689221556.662:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470733 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617812.958637] exe[473479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578a49e9839 cs:33 sp:7f4af18abee8 ax:0 si:20000240 di:ffffffffff600000 [11617850.443757] audit: type=1326 audit(1689221597.642:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617882.299739] audit: type=1326 audit(1689221629.498:926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617893.147005] audit: type=1326 audit(1689221640.346:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=473353 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617934.186694] audit: type=1326 audit(1689221681.382:928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617983.641154] audit: type=1326 audit(1689221730.833:929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618007.754035] exe[479109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc7088839 cs:33 sp:7f115bb4aee8 ax:0 si:20000240 di:ffffffffff600000 [11618023.408403] exe[477266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.501534] exe[471958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.601684] exe[471707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618024.400520] audit: type=1326 audit(1689221771.597:930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=477359 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618074.174434] audit: type=1326 audit(1689221821.369:931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618146.086115] audit: type=1326 audit(1689221893.281:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=480365 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618165.619972] audit: type=1326 audit(1689221912.817:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.009828] audit: type=1326 audit(1689221982.205:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437493 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.035898] audit: type=1326 audit(1689221982.233:935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=485075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618257.120281] audit: type=1326 audit(1689222004.317:936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618306.553982] audit: type=1326 audit(1689222053.749:937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618309.160749] audit: type=1326 audit(1689222056.357:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618328.009567] audit: type=1326 audit(1689222075.205:939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=491196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618396.215364] audit: type=1326 audit(1689222143.413:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618458.057109] audit: type=1326 audit(1689222205.253:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618471.167306] audit: type=1326 audit(1689222218.365:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493625 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618558.971085] audit: type=1326 audit(1689222306.165:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=498306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618599.005616] audit: type=1326 audit(1689222346.201:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500998 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618614.605767] audit: type=1326 audit(1689222361.801:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471350 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618616.160870] audit: type=1326 audit(1689222363.357:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453695 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618632.621352] audit: type=1326 audit(1689222379.817:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=502952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618740.688253] audit: type=1326 audit(1689222487.888:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618794.782232] audit: type=1326 audit(1689222541.980:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=516208 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618828.244900] audit: type=1326 audit(1689222575.444:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442795 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618883.250327] audit: type=1326 audit(1689222630.448:951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=527662 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618905.654237] audit: type=1326 audit(1689222652.852:952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=539741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618955.994306] audit: type=1326 audit(1689222703.192:953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618991.070845] audit: type=1326 audit(1689222738.268:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618995.914657] exe[531498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae92ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.576485] exe[545055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.698654] exe[515605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618998.466088] audit: type=1326 audit(1689222745.664:955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545946 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619039.105891] audit: type=1326 audit(1689222786.304:956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=540251 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619081.481628] audit: type=1326 audit(1689222828.680:957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472579 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619132.788973] audit: type=1326 audit(1689222879.988:958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=546430 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619169.205197] audit: type=1326 audit(1689222916.404:959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552581 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619181.529368] audit: type=1326 audit(1689222928.728:960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=548478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619204.740432] audit: type=1326 audit(1689222951.940:961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=554938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619231.628546] audit: type=1326 audit(1689222978.828:962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619294.278304] audit: type=1326 audit(1689223041.476:963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619302.932977] audit: type=1326 audit(1689223050.132:964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=553420 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619324.619811] audit: type=1326 audit(1689223071.816:965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619336.253946] audit: type=1326 audit(1689223083.452:966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619398.879385] exe[536155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.939422] exe[516375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.982844] exe[535671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619453.791031] audit: type=1326 audit(1689223200.987:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619465.706772] audit: type=1326 audit(1689223212.903:968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550448 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619487.423938] exe[566400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563c4858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.482399] exe[562461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.528570] exe[563319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619585.499945] audit: type=1326 audit(1689223332.695:969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619596.902218] audit: type=1326 audit(1689223344.099:970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565827 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619607.979102] audit: type=1326 audit(1689223355.175:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619689.631929] audit: type=1326 audit(1689223436.827:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619831.695309] audit: type=1326 audit(1689223578.891:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575570 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619856.886854] audit: type=1326 audit(1689223604.083:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577025 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619974.006322] audit: type=1326 audit(1689223721.203:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579928 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620035.655078] audit: type=1326 audit(1689223782.851:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=581361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620114.896040] audit: type=1326 audit(1689223862.090:977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=547279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620115.147632] audit: type=1326 audit(1689223862.342:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620215.428928] exe[578382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.470748] exe[578378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.508820] exe[545514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620227.851853] audit: type=1326 audit(1689223975.046:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=588747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620256.627986] audit: type=1326 audit(1689224003.822:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=591341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620370.738511] audit: type=1326 audit(1689224117.934:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620399.160346] audit: type=1326 audit(1689224146.354:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596641 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620513.054444] audit: type=1326 audit(1689224260.250:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620514.934894] audit: type=1326 audit(1689224262.130:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=600527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620580.941265] audit: type=1326 audit(1689224328.134:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620643.919662] audit: type=1326 audit(1689224391.114:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620654.467678] audit: type=1326 audit(1689224401.662:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620678.185533] audit: type=1326 audit(1689224425.382:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620753.378385] audit: type=1326 audit(1689224500.574:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606613 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620775.839985] audit: type=1326 audit(1689224523.034:990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620787.380160] audit: type=1326 audit(1689224534.574:991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620878.192117] audit: type=1326 audit(1689224625.385:992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=593770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620910.511245] audit: type=1326 audit(1689224657.705:993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620929.852560] audit: type=1326 audit(1689224677.045:994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=611154 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620952.654833] audit: type=1326 audit(1689224699.849:995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=615888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620975.728228] exe[616067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.809466] exe[616334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.900989] exe[616113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11621052.917706] audit: type=1326 audit(1689224800.113:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614987 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621080.863296] audit: type=1326 audit(1689224828.057:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621086.905149] audit: type=1326 audit(1689224834.097:998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616503 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621093.759891] audit: type=1326 audit(1689224840.953:999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621116.237723] audit: type=1326 audit(1689224863.429:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620684 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621196.426285] audit: type=1326 audit(1689224943.621:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=619071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621228.541993] audit: type=1326 audit(1689224975.737:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621254.426277] audit: type=1326 audit(1689225001.621:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621296.541965] audit: type=1326 audit(1689225043.737:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621338.665441] audit: type=1326 audit(1689225085.857:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=624649 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621388.698603] audit: type=1326 audit(1689225135.893:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=626245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621531.083825] audit: type=1326 audit(1689225278.277:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621601.363569] audit: type=1326 audit(1689225348.560:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=629565 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621641.234574] audit: type=1326 audit(1689225388.432:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000